S4x23 Review Part 4: Cybersecurity for Industrial IoT

S4x23 Review Part 4: Cybersecurity for Industrial IoT

Bellotti said first that we should start with the realization that legacy technologies are successful technologies. Legacy technologies remain because they are usable and important. They are the foundation for other systems therefore it has a significant impact when they are changed. But people believe in some myths of modernization. First, the technology is regarded as old. It doesn’t matter if the technology is new or old. For example, Python is older than Java, and…

Read More

ICS/OT Cybersecurity 2022 TXOne Annual Report Insights

ICS/OT Cybersecurity 2022 TXOne Annual Report Insights

ICS/OT Cybersecurity 2022 TXOne Annual Report Insights Cyber Threats This article gives an in-depth overview of TXOne’s insight report on ICS/OT cyber incidents. By: Trend Micro March 29, 2023 Read time:  ( words) TXOne Networks, Trend Micro’s dedicated OT security subsidiary, has released its annual ICS/OT security report. This report consists of three studies: insights from ICS/OT cyber incidents, an analysis of the ICS/OT security market, and an online survey of asset owners. This blog…

Read More

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

COVID Task ForceIn 2017, before the pandemic, he was involved in providing a report to improve cybersecurity in the healthcare industry as a member of the Healthcare Cybersecurity Task Force. The report raised concerns that the healthcare industry was in the critical condition, suggesting severe lack of security talent, legacy equipment, premature/over-connectivity, vulnerabilities impacting patient care, and an epidemic of known vulnerabilities. He later worked on initiatives to protect medical care during the pandemic as…

Read More

S4x23 Review Part 2: Evolving Energy Cybersecurity

S4x23 Review Part 2: Evolving Energy Cybersecurity

While public-private partnerships may have been successful for large businesses, small businesses with limited financial and human assets still face challenges. The 100-day plan has certainly advanced cybersecurity in the energy sector by focusing on ICS security and grid security and facilitating coordination between public and private entities and agencies. However, challenges have been raised in the areas of information sharing among small utilities, solutions tailored for them, and sustainable initiatives. Innovative threat intelligence and…

Read More

S4x23 Review Part 1: What’s New in OT Security

S4x23 Review Part 1: What’s New in OT Security

In this blog, I will introduce discussions from S4 over several posts. The first installment will cover two topics from the academic interviews. Interview with Michael Fischerkeller – Author of Cyber Persistence Theory Fischerkeller is a senior researcher in the Institute for Defense Analyses and has been involved in shaping US government security policy for over 25 years. Based on this experience, he published “Cyber Persistence Theory” with two co-authors, aiming to bridge the gap…

Read More

A Deep Dive into the Evolution of Ransomware Part 3

A Deep Dive into the Evolution of Ransomware Part 3

A Deep Dive into the Evolution of Ransomware Part 3 Privacy & Risks This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the early stages to current trends. By: Trend Micro February 27, 2023 Read time:  ( words) Ransomware is an ever-growing problem that has wreaked havoc across a multitude of industries, with astronomical ransom demands leaving businesses and infrastructure feeling powerless. From major hospitals to enterprises –…

Read More

A Deep Dive into the Evolution of Ransomware Part 2

A Deep Dive into the Evolution of Ransomware Part 2

Ransomware has become an increasingly damaging presence, wreaking havoc on organizations of all sizes and across industries. Without understanding the traditions that underpin these malicious strategies, combatting them can feel like a daunting task. In part one, we explore ransomware’s evolution to gain perspective on how cybercriminals adapt their tactics in response to changing threats. This entry looks into factors that trigger changes in cyber criminals’ business models. Triggers for a paradigm shift Cybercriminals are…

Read More

A Deep Dive into the Evolution of Ransomware Part 1

A Deep Dive into the Evolution of Ransomware Part 1

A Deep Dive into the Evolution of Ransomware Part 1 Ransomware This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the early stages to current trends. By: Trend Micro February 21, 2023 Read time:  ( words) Ransomware has become a notorious and damaging form of malware, inflicting financial losses on enterprises, governments, healthcare organizations and core infrastructure. Ransomware has been a very profitable activity for malicious actors. However,…

Read More

CISO’s Challenges Involved with Business Leader & SOC

CISO’s Challenges Involved with Business Leader & SOC

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. As the cyber and physical worlds converge, the responsibilities of CISO, the cybersecurity leader of an organization, are becoming broader and deeper. However, they are not necessarily backed by management and don’t have enough resources. CISOs themselves are concerned about an ever-expanding attack surface and already admit spiraling out of control. From a CISO’s perspective, business leaders…

Read More

Ransomware Business Models: Future Pivots and Trends

Ransomware Business Models: Future Pivots and Trends

RDP port 3389 remains a popular service abused by ransomware actors to gain initial access to systems located and connected to on-premise infrastructure. However, as more organizations shift to the cloud services for file storage and active directory systems, ransomware groups will look for more opportunities to develop and/or exploit vulnerabilities not yet leveraged at scale. Evolutions Gradual evolutions in the current modern ransomware models as we know them are expected to be tweaked in…

Read More
1 2 3 5