“Air-Gapping” IT and OT?

Following the Colonial Pipeline Ransomware incident, Twitter exploded in to an orgy of blather from people demanding that we “air-gap” ICS. Those righteous keyboard warriors know what is best, I’m sure. We cannot avoid having a secured connection with the office. But on the other hand, we don’t need ICS networks to be connected to […]

The Colonial Pipeline cyberattack – Did IT/OT convergence contribute to the attack

After having done the analysis of the Bellingham, WA Olympic Pipeline rupture that killed 3 people for NIST, I expected the Colonial Pipeline hack to be an OT incident affecting the SCADA system and potentially causing pipe leaks or pipe ruptures. However, that does not appear to be the issue in this case. Darkside’s malware […]

Control system cyber incidents are much more plentiful than people realize

Control systems are systems of systems. Consequently, when one device or system is compromised, it can impact many others, potentially numbered in the tens to thousands. If I were to have counted all of the individual cases, my database would have almost 12 million control system cyber incidents. The insurance industry and credit rating agencies […]

Are your buildings and cloud cyber secure?

Many data centers that support the cloud as well as commercial buildings have not adequately addressed control system cyber security. The lack of adequately addressing building control system cyber security was demonstrated to have caused very significant financial and potentially safety impacts. When you consider these control system cyber threats can affect multiple buildings, the […]

A Reality Check of the DOE 100-Day Plan to Address Cybersecurity Risks to the US Electric System

I am happy to see ICS cyber security specifically being addressed by the US Secretary of Energy. It is “unobtainium” to secure the electric system, or any other industry which uses the same equipment, within 100 days even though there can be a good start. Network cyber threat prevention and situational awareness can be employed […]

Enough About Data Breaches. Let’s Talk About OT Security – TAG Cyber

Tag Cyber moderated a roundtable discussion with Mark Weatherford and me on control system cybersecurity.  The discussion was why operational technology (OT) is woefully neglected—and what can be done to change that. This discussion becomes even more timely with the recent DOE 100-Day Plan to Address Cybersecurity Risks to the US Electric System. The roundtable […]

Can We Trust Control Systems Networks?

Deputy National Security Advisor for Cyber and Emerging Technology, Anne Neuberger, was quoted by Adam Mazmanian in FCW on April 8, 2021 saying “We picked control systems because those are the systems that control water systems, power systems, chemical systems, across the U.S. And we’re seeking to have visibility on those networks to detect anomalous […]

Security Encabulation

For a number of years, work has been proceeding to perfect to the crudely conceived idea of a security augmentation system that would not only supply reverse DNS lookup for use in gratuitous ARP regeneration, but would also be capable of automatic stochastant intelligence. Such a computationless process is the security encabulator. Now basically the […]

Data center cybersecurity – don’t overlook the cyber vulnerable building control systems

According to many people, data is the new oil. Industries such as insurance, finance, retail, etc. depend on massive amounts of data from multiple data centers. However, what happens if you can’t get to your data because the data center infrastructure or servers have been damaged and are unusable? Data is merely a series of […]