New Bill to Require Cyber Attack Reporting in the US Researcher

The Cyber Incident Notification Act of 2021 would also require CISA to launch a program that would notify organizations of various vectors that malicious actors exploit. Read More HERE…

Read more

Secure Manufacturing on Cloud, Edge and 5G (Download PDF) Security Expert

This e-book provides you with insight into system changes brought on by factory production processes and explains how the cloud and 5G have transformed smart factories. You’ll also receive a look into how we map the attack scenario so you can identify the type of risks that lie throughout the entire system. Read More HERE…

Read more

Security Risks with Private 5G in Manufacturing Companies Part. 1 Security Evangelist

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the “democratization of communications” entails its own risks that have not yet been made clear. To identify these risks, Trend Micro performed tests using an environment modeled after a steelworks with 5G equipment. Read More HERE…

Read more

CISA, NIST Says Use Cybersecurity Control Systems

The agencies conducted a crosswalk of existing cybersecurity documents and identified nine categories to be used as the foundation for preliminary control systems cybersecurity performance goals. Read More HERE…

Read more

API Releases New Standard for Pipeline Control Systems

The latest version comes weeks after US President Biden announced a memo, calling on the improvement of control systems cybersecurity. It also expands the coverage of previous editions, covering all control systems. Read More HERE…

Read more

Biden Releases Memo on Critical Cybersecurity Infrastructure Bill

The US president announces the creation of a new cybersecurity initiative, aiming to improve the security of critical infrastructure control systems. New performance goals will also be made, ensuring a consistent baseline for cybersecurity. Read More HERE…

Read more

Homeland Security Releases New Cybersecurity Rules

DHS’s second issue requires pipeline operators to implement various cybersecurity measures to protect their operations from cyber attacks. This directive also builds upon the department’s May directive following the Colonial Pipeline attack. Read More HERE…

Read more

Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher

The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints,” presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. Read More HERE…

Read more

Threats From a Compromised 4G/5G Campus Network Sr. Threat Researcher Sr. Threat Researcher Manager, Threat Research

5G acts as a catalyst for change for industrial environments. One part of its deployment is the 4G/5G campus network for some organizations. In our research we delve into the security risks and implications of this technology. Read More HERE…

Read more