Industrial Cyber Security News
Stay up-to-date with Nozomi Networks on and
Suzanne Spaulding, a former Department of Homeland Security (DHS) under-secretary and Nozomi Networks advisor, warned that the loss of so many government employees means the US is “losing ground against our adversaries.”
Cyber-security is hard enough with a full team. Operating at less than half strength means we are losing ground against our adversaries.
I’m confident DHS has done its best to identify which workers are essential to protect human life and property from imminent threat, but one thing needs to be made clear. When we talk about the percentage of the workforce that is exempt — for example, let’s say 55 percent of government “Organization A” is exempt — that doesn’t mean that 55 percent of the work is getting done. Those exempt cyber workers are only cleared to do the essential duties that protect against imminent threats.
When it comes to election security, it’s easy to play into the FUD (fear, uncertainty, and doubt). But for all the talk around election security, the problem isn’t as bad as many people think — and it is getting better. One thing is for sure: We’re in better shape today than we were two years ago.
Nozomi Networks Advisor Suzanne Spaulding warned that enemies of the U.S might take advantage of the shutdown: “If I were a bad actor, this would be a very tempting time to do some mischief.”
With fewer physical controls in place it will be harder to regain control of systems, minimise damage, and stop an attack from progressing,” she adds. “Given the benefits of the networked world the move to digitalisation isn’t going to slow down. It’s important we realistically asses our dependence upon cyber and the potential consequences of a disruptive attack.
Former DHS Under Secretary and Nozomi Networks adviser Suzanne Spaulding adds that the electric grid in America has a “fair amount of physical redundancy” to back cyber controls, but as virtual infrastructure becomes embraced, those physical redundancies are abandoned, which would make it easier for an attacker to have “cascading impacts that can cause real damage”.
“Ever more sophisticated tools and techniques for hacking are available for downloading from the web. This means that the number of unsophisticated hackers able to break into systems will rise,” said (Nozomi Networks Advisor) Suzanne Spaulding, who served as under-secretary for the National Protection and Programs Directorate at the Department of Homeland Security (DHS) during the Obama era.
“If we have a significant cyber incident, the normal mechanisms for coordinating that interagency response that is absolutely required, that’s going to be very difficult without a cyber coordinator at the White House,” (Nozomi Networks Advisor) Suzanne Spaulding, who served as undersecretary for the National Protection and Programs Directorate at the Department of Homeland Security (DHS) during the Obama era, told VICE News.
As we continue to improve our non-cyber responses and further develop our cyber-toolbox, we’ll see that the US is less hesitant and more aggressive when it comes to calling out attackers.
“The recent report from the US Department of Defence Inspector General (DOD IG) brings attention to the urgency of securing national defence infrastructure and it is concerning to hear that many of the locations inspected have been deemed insecure,” commented Edgard Capdevielle, CEO at Nozomi Networks.
A IT/OT SOC is a forward-thinking way to address and mitigate cyber risks companywide.
Connecting industrial control systems to internal and external networks is no doubt a boon to productivity but is also posing an increasing threat to our critical national infrastructure.
Andrea Carcano, co-founder of Nozomi Networks, claimed the attackers likely used phishing attacks to spread the info-stealing malware.
As cyberattacks are ever evolving and becoming more advanced, it’s time for technology leaders to step up and ensure they have the right measures in place to maintain a robust cybersecurity programme for critical national infrastructure (CNI). We hear from Kim Legelis, CMO, Nozomi Networks, who explains the cyber-risks associated with CNI and advises on how to tackle them.
Alessandro Di Pinto, Nozomi Networks Security Researcher, discusses the recently discovered piece of malware, GreyEnergy, targeting critical infrastructure.
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI).
Ukrainian authorities have said that they have stopped a large-scale cyberattack attributed to Russia.
Moreno Carullo, co-founder and CTO of Nozomi Networks believes that the attacks highlight the ongoing threat of phishing attacks and the importance of educating those within organisations how to recognise fraudulent emails:
“The attacks on Ukraine’s telecommunications systems highlight that attackers are once again relying on phishing as a means to target critical infrastructure,” Moreno Carullo, co-founder and CTO of Nozomi Networks, told VICE News.
Moreno Carullo, co-founder and chief technology officer (CTO) of industrial cyber security firm Nozomi Networks, said the attacks on Ukraine’s telecommunications systems highlighted that attackers were once again relying on phishing as a means to target critical national infrastructure (CNI).