MGS+ ICS Security Report September 2017
MG Strategy+ ICS Security Report September 2017: Editor Picks: News Intelligence Alerts Reports
WannaCry Post Mortem: Early Warning Indicators and Lessons Learned for the Healthcare Industry
As the saying goes, “those who don’t learn from history are doomed to repeat it.” Some very recent history that’s worth tuning in to is the story of the WannaCry attacks that took place this past April and May. ….
Source: https://blog.hitrustalliance.net/wannacry-post-mortem-early-warning-indicators-lessons-learned-healthcare-industry/
The State of SCADA HMI Vulnerabilities
Attacking SCADA Through HMIs: SCADA systems run the world’s various critical infrastructure sectors and are thus inherently attractive to different threat actors. Threat actors can use their access to SCADA systems to gather information such as a facility’s layout, critical thresholds, or device settings for use in later attacks.
Source: https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/the-state-of-scada-hmi-vulnerabilities
The future of being human
One of our great debates is whether we are on the cusp of a robot-and-artificial intelligence apocalypse that renders many humans jobless, at least in the sense of work as we know it today: Is super-human intelligence coming soon? Is it coming at all? Are humans in danger? The reality is that, despite great certitude on all sides, no one really knows…
Source: https://www.axios.com/the-future-of-being-human-2476364075.html
GE shifts strategy, financial targets for digital business after missteps
“There was a lot of money spent on Predix,” said a former senior financial executive at GE who worked with Flannery. “They are going to tighten the grip and ensure there’s a return.”
Source: https://www.reuters.com/article/us-ge-digital-outlook-insight/ge-shifts-strategy-financial-targets-for-digital-business-after-missteps-idUSKCN1B80CB
How Machine Learning Enhances The Value Of Industrial Internet of Things
Industrial Internet of Things (IIoT) is already revolutionizing domains such as manufacturing, automobiles and healthcare. But the real value of IIoT will be realized only when Machine Learning (ML) is applied to the sensor data.
Source: https://www.forbes.com/sites/janakirammsv/2017/08/27/how-machine-learning-enhances-the-value-of-industrial-internet-of-things/#c30569b3f389
Threat Intelligence’s Big Data Problem
Security teams are drowning in often useless threat intel data, but signs of maturity are emerging in what IT-Harvest predicts will be a $1.5 billion market by 2018.
Source: https://www.darkreading.com/threat-intelligence/threat-intelligences-big-data-problem/d/d-id/1324702
SANS Institute Survey Finds Unprotected Devices and Ransomware are Top Threats to Industrial Control Systems
SANS Institute’s annual survey of industrial control systems (ICS) has revealed that the introduction of unprotected devices into sensitive ICS networks and ransomware are now among the top threats that organizations face in securing critical infrastructure. In addition, 69% of respondents stated that the level of threats to control systems is now high or severely critical.
Source: http://www.globalsecuritymag.com/SANS-Institute-Survey-Finds,20170814,73115.html
What Is Threat Intelligence? Definition and Examples
Everybody in the security world knows the term “threat intelligence.” At this point, even some non-security folks have started talking about it. But it’s still very poorly understood.
Source: https://www.recordedfuture.com/threat-intelligence-definition/
Ukraine Cyberattack Was Meant to Paralyze, not Profit, Evidence Shows
Cybersecurity experts based their reasoning partly on having identified the group of Ukrainian users who were initially and improbably targeted: tax accountants.
Source: https://www.nytimes.com/2017/06/28/world/europe/ukraine-ransomware-cyberbomb-accountants-russia.html
Shodan and Censys: the ominous guides through the Internet of Things Snapchat caught in phishing campaign
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading up to traffic light management systems and street security cameras. Since they are connected, all of them can be found in two worlds — both in the real world and in the Web.
Source: https://www.kaspersky.com/blog/shodan-censys/11430/
Tags: Automation,Big Data,Critical Infrastructure,CyberSecurity,HMI Vulnerabilities,IIot,Industrial Control Systems,Machine Learning,Predix,SCADA,Threat Intelligence,WannaCry,