iot - Tagged - Security Boulevard The Home of the Security Bloggers Network Thu, 21 Nov 2024 17:33:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png iot - Tagged - Security Boulevard 32 32 133346385 Here’s Yet Another D-Link RCE That Won’t be Fixed https://securityboulevard.com/2024/11/d-link-router-critical-rce-sol-richixbw/ Thu, 21 Nov 2024 17:33:40 +0000 https://securityboulevard.com/?p=2037237 A D-Link DSR-250N, which is now EOL

D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear.

The post Here’s Yet Another D-Link RCE That Won’t be Fixed appeared first on Security Boulevard.

]]>
2037237
These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER https://securityboulevard.com/2024/11/d-link-nas-wont-fix-richixbw/ Wed, 13 Nov 2024 17:22:08 +0000 https://securityboulevard.com/?p=2036204 xkcd.com/327 — “Exploits of a Mom”

‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability.

The post These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER appeared first on Security Boulevard.

]]>
2036204
Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT https://securityboulevard.com/2024/11/protecting-critical-infrastructure-a-collaborative-approach-to-security-for-ics-ot-and-iiot/ https://securityboulevard.com/2024/11/protecting-critical-infrastructure-a-collaborative-approach-to-security-for-ics-ot-and-iiot/#respond Tue, 12 Nov 2024 14:00:00 +0000 https://www.guidepointsecurity.com/?p=36314 Digital Blue SpaceIn an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), […]

The post Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/protecting-critical-infrastructure-a-collaborative-approach-to-security-for-ics-ot-and-iiot/feed/ 0 2036096
Leveraging Tabletop exercises to Enhance OT security maturity https://securityboulevard.com/2024/11/leveraging-tabletop-exercises-to-enhance-ot-security-maturity/ https://securityboulevard.com/2024/11/leveraging-tabletop-exercises-to-enhance-ot-security-maturity/#respond Tue, 05 Nov 2024 08:37:57 +0000 https://sectrio.com/?p=71173 Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security programs running in compliance with IEC 62443? If your answer is no for any of the above questions, then this article is for you. Why do we need to conduct OT security tabletop exercises regularly? Tabletop exercises help security teams play out scenarios to test various components of an OT security program including elements of governance, compliance and incident response. Such tests can be conducted without the risk of downtime to test the effectiveness of various response mechanisms and the role of people and processes in it. Download our TTX template now: OT Security Tabletop Exercise. The scope of an OT security tabletop exercise should ideally cover: Objective and definition: Identify and set specific goals for the exercise, such as testing incident response plans, improving employee communication, testing a specific aspect of OT security approach or identifying gaps in security posture that may hinder a coherent response to an OT security incident or event. Realistic scenario development in tabletop exercises involves: Who should participate in an OT security tabletop exercise? Ideally, any team that is connected with OT directly or otherwise should participate in these exercises. A tentative list of participants includes: What roles and responsibilities can be assigned to the participants during a tabletop exercise? The role of each participant should be clearly defined as per the scenario being tested. Suggested roles include: Understand and learn how you can benefit from assigning specific roles and responsibilities using the help of IEC 62443 and NIST CSF: OT Security Roles and Responsibilities How can an incident flow be developed during a tabletop exercise Any simulated/unfolding event can be divided into various parts such as: The performance of each aspect of the exercise should be evaluated in detail at a step/response level. Download your copy of the Facility Incident Response Plan and Checklist now! Essential factors for a successful OT security tabletop exercise What are the benefits of a tabletop exercise? The following are some of the benefits that institutions and teams can gather: 1. Improved OT/ICS and IoT incident response 2. Better cross-functional collaboration 3. Increased awareness of OT security risks 4. An opportunity to test the relevance and applicability of security controls, incident playbooks and policies 5. Enhanced crisis planning and management 6. Continuous improvement 7. Reinforce cyber resilience measures Through OT security tabletop businesses can continually evolve their cybersecurity strategies to face emerging OT threats thereby safeguarding and enhancing operational continuity and resilience. Book a consultation with our ICS security experts now. Contact Us Thinking of an ICS security training program for your employees? Talk to us for a custom package.   

The post Leveraging Tabletop exercises to Enhance OT security maturity appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/leveraging-tabletop-exercises-to-enhance-ot-security-maturity/feed/ 0 2035048
IoT Security Failures Can Be Sh*tty https://securityboulevard.com/2024/11/iot-security-failures-can-be-shtty/ Fri, 01 Nov 2024 23:56:27 +0000 https://www.viakoo.com/?p=12929 It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different.  The Register reported that in Moscow a skyscraper-high plume of sewage had erupted, with speculation that Ukrainian hackers were behind it (the official explanation was that it was a gas release because of […]

The post IoT Security Failures Can Be Sh*tty appeared first on Viakoo, Inc.

The post IoT Security Failures Can Be Sh*tty appeared first on Security Boulevard.

]]>
2034924
October Can Be Scary https://securityboulevard.com/2024/10/october-can-be-scary/ Wed, 23 Oct 2024 23:50:53 +0000 https://www.viakoo.com/?p=12926 Every October brings both Halloween and National Cybersecurity Awareness Month (NCSAM).  Most people know about Halloween, but if you’re just coming up to speed on NCSAM here is some background.  National Cybersecurity Awareness Month (NCSAM) was established in the United States in October 2004 (yes, this is the 20th anniversary!). It was a collaborative effort […]

The post October Can Be Scary appeared first on Viakoo, Inc.

The post October Can Be Scary appeared first on Security Boulevard.

]]>
2034206
How to evaluate OT security program maturity https://securityboulevard.com/2024/10/how-to-evaluate-ot-security-program-maturity/ Wed, 23 Oct 2024 13:21:01 +0000 https://sectrio.com/?p=71039 An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program include: At a fundamental level, an OT security program provides a strong foundation for an enterprise to adopt and scale up security measures. What is OT security program maturity? Based on various factors, an OT security program can be graded into the following tiers: Parameter   Mature OT Security Program Evolutionary/Evolving OT Security Program Early stage OT Security Program Score Clear delineation of roles and responsibilities All personnel across functions are clear about their roles and responsibilities. All employees are in alignment with the assigned roles for managing security collectively. Every team has a employee responsible for security. This delineation is clear within the security operations teams. The larger organization does not subscribe to the program or subscribes in parts driven by a compliance mandate or any other factor that originates from outside the organization. Security teams are solely responsible for security. In the event of an incident, the security team is held responsible.   Security measures are driven by a well-drafted security policy and a governance framework that is binding for all employees Yes. All teams and employees are governed through and are required to adhere to a security policy that may derive elements from standards such as IEC 62443 yet projects a distinct security mandate while incorporating cultural elements from the organization and its operational imperatives.  The policy clearly articulates the security requirements at all operational and asset levels. The policy is generic in nature without paying any attention to the unique institutional character of the organization. Compliance to the policy is also partial and episodic. There is no policy in place   Management and senior leadership are engaged in the security program and are active contributors  Fully engaged and security-sensitive management Management is partially engaged and does not track the program Management is not connected with the program in any way   Evolved incident response and disaster recovery mechanisms Followed in letter and spirit with clear protocols A mix of proactive and reactive measures are in place. Assets and data are at risk due to a potential for delay in intervention after an incident No measures in place   Risk assessment and gap analysis audit frequency Once every 180 days Once every 365 days Infrequent or performed in an adhoc manner   Institutional action on OT security audit findings Key audit findings are addressed within a pre-agreed time frame. OT security policy is modified to reflect major suggestions Audit findings are addressed but not in a time bound manner If an audit is done, then the findings are ignored or filed without any action being taken   Program coverage 100 percent across assets, infrastructure, services, process, sites and networks Partial Less or none   Security Operations coverage – asset visibility, vulnerability and patch management, secure remote access, SOC, hard segmentation of OT and IT networks Complete/100 percent Partial Less or none   Improvement in key security operations metrics such as MTTD, MTTR, number of events closed, percentage of false positives  over the last 11 months 30 percent 15 but less than 30 < 10 percent improvement   Has the program been evaluated by a qualified third party? Yes No No   How frequently OT security awareness programs run? Once a quarter Once every 9 months Only in October   Are crown jewels and legacy systems residing behind a DMZ? Yes Yes No   Strong anomaly and breach detection capabilities Yes Approaching strong but not yet there Weak or non-existent   Countermeasures in place around access controls and insider activity Yes Partial measures in place No   Cybersecurity risk in ICS environment is managed through strategic security planning and controls Yes Partial measures in place No   OT security assurance is arrived through risk minimization and management of risk exposure Yes Partial measures in place No   Lifecycle measures in place for each aspect mentioned above Yes Partial measures in place No   ICS controls derived from last OT security audit cycle implemented Yes Partially No   Secure design architecture and engineering compliance in place Yes Initial/rudimentary No   Microsegmentation implemented Yes No No   Calculating the score of your OT Security program To derive your OT security program effectiveness score, assign 40 points for each mature program parameter met, 20 for each evolving program parameter met and 5 or 0 (for each No) for every early stage program parameter met. For example for the parameter “Microsegmentation Implemented”, the following score will apply: Yes: 40 points   No: 0No: 0 For the “Secure design architecture and engineering compliance in place” parameter you can follow the below points scheme: Yes: 40 pointsInitial/rudimentary: 20 pointsNo: 0 points If your total score is above 650 points, then you are running a mature OT security program. Congratulations. If your total score is above 350 but less than 650, then you are running an evolving security program. Let’s ramp up. If your total score is below 350 points, then you have a lot of catching up to do. No matter where your OT security program is on the above scale, Sectrio can help you run a model and relevant security program that is also high on RoI. Talk to our OT security program expert now through a free consultation to figure out your next steps. 62443, NIST CSF, and NIST SP 800, talk to a Sectrio OT governance expert. Book a consultation with our ICS security experts now. Contact Us Thinking of an ICS security training program for your employees? Talk to us for a custom package.   

The post How to evaluate OT security program maturity appeared first on Security Boulevard.

]]>
2034067
Hacked Robot Vacuums, Secret Printer Tracking Dots https://securityboulevard.com/2024/10/hacked-robot-vacuums-secret-printer-tracking-dots/ Mon, 21 Oct 2024 04:00:18 +0000 https://sharedsecurity.net/?p=101946 In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth hack and its broader cybersecurity implications. Additionally, the ‘Aware Much?’ segment reveals the world of hidden printer tracking dots, used for tracing document […]

The post Hacked Robot Vacuums, Secret Printer Tracking Dots appeared first on Shared Security Podcast.

The post Hacked Robot Vacuums, Secret Printer Tracking Dots appeared first on Security Boulevard.

]]>
2033839
World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security https://securityboulevard.com/2024/10/world-economic-forum-ai-quantum-require-paradigm-shift-in-security/ Thu, 17 Oct 2024 20:19:34 +0000 https://securityboulevard.com/?p=2033639 AI emerging technology secure by design cybersecurity

The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies like AI, quantum computing, and the Internet of Things.

The post World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security appeared first on Security Boulevard.

]]>
2033639
Launching a critical infrastructure security program in 4 phases https://securityboulevard.com/2024/10/launching-a-critical-infrastructure-security-program-in-4-phases/ Wed, 16 Oct 2024 05:08:23 +0000 https://sectrio.com/?p=70857 As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control systems of critical infrastructure organizations. Organizations that are running their ICS infrastructure without adequate visibility into their networks and operations are especially vulnerable to such threat actors. So how can critical infrastructure operators respond to this emerging threat? The answer lies in launching a structured institutional OT security program with a strong foundation to improve and strengthen their existing OT security measures in a phased manner. Such an approach ensures asset assurance, and improved visibility into the outcomes of each measure and allows OT asset owners to move forward with more learning and knowledge. So what does a structured critical infrastructure OT security program look like? Now let’s look at each of these OT security phases in more detail. Phase 1: Understanding the present state of OT security in your Critical Infrastructure This phase includes conducting an IEC 62443-based OT/ICS Cybersecurity Assessment to determine the gaps and issues with the current OT security approach. The following aspects need to be highlighted in detail in the assessment: · You can use this IEC 62443 checklist for the above exercise. Phase 2: Implement security measures including those to secure infrastructure and detect threats In this phase, the measures designed to gain visibility, and protect networks and assets while securing them with various measures such as: Hard network segmentation between OT and IT networks Phase 3: Evaluate data and security measures (measure success) During this phase, all security management measures should be institutionalized through an OT Security Operations Center. The SOC should also have an incident response and management component either in-house or through managed means. An OT security audit is recommended at this phase to gather data on the effectiveness of the security measures and the impact of the OT governance and security policy in an integrated manner. This phase should cover: Phase 4: Channel the learnings from your OT security program Regular internal and external workshops to share learnings from all aspects of cybersecurity operations To learn more about a structured OT security program that incorporates IEC 62443, NIST CSF, and NIST SP 800, talk to a Sectrio OT governance expert. Book a consultation with our ICS security experts now. Contact Us Thinking of an ICS security training program for your employees? Talk to us for a custom package.   

The post Launching a critical infrastructure security program in 4 phases appeared first on Security Boulevard.

]]>
2033499