433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

Dozens of insecure-by-design flaws found in OT products

A new research project has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors, all of which stem from insecurely designed or implemented functionality rather than programming errors. This highlights that despite the increased attention this type of critical devices have received over the past decade from both security researchers and malicious attackers, the industry is still not following fundamental secure-by-design principles. “Exploiting these vulnerabilities, attackers with network access to a target device could remotely execute code, change the logic, files or firmware of OT devices, bypass authentication, compromise credentials, cause denials of service or have a variety of operational impacts,” researchers from security firm Forescout said in their new report. To read this article in full, please click here
http://news.poseidon-us.com/SSg9Ff

A tale of two agencies trying to implement a new electronic health record

In today’s Federal Newscast, the Veterans Affairs Department is delaying the launch of its EHR in certain areas, while the Defense Department’s is moving right along.
http://news.poseidon-us.com/SSfNDq

USDA has been trying to consolidate 17 networks for a decade, now it has the money to do it

The Technology Modernization Fund Board made three awards to USDA, DHS and FTC for a total of $94.8 million for network and cyber efforts.
http://news.poseidon-us.com/SSfBPR

Report: The slow destruction of the defense industrial base

Moshe Schwartz, president of Etherton and Associates, joins host Roger Waldron on this week’s Off the Shelf  to discuss The Slow Destruction of the Defense Industrial Base, a report Schwartz co-authored with Michelle Johnson from the Naval Postgraduate School.
http://news.poseidon-us.com/SSddPf

BrandPost: The 3 Requirements of a Multi-Cloud IT Infrastructure

Every once in a while, you run across an article of clothing like a rain poncho or wrap-around skirts with a tag that says, “one size fits all” or “one size fits most.” In theory, the garment fits most average-sized people. But even if you’re wearing what is effectively a tent, one size never fits all. People are all different shapes and sizes, so that medium-sized poncho will leave the six-foot-tall person soaked while the five-foot-tall person is dragging it through the mud. Whether it’s clothing or technology, there’s no such thing as one size fits all. Although it has taken a while, most organizations have moved beyond a “one cloud fits all” approach and use two or more clouds to achieve their desired business outcomes or as a necessity to bridge the old with the new, running critical legacy on-premises while migrating to cloud where possible.  Some organizations might pursue a multi-cloud approach to increase redundancy and resiliency and decrease costs and their reliance on a single provider. To read this article in full, please click here
http://news.poseidon-us.com/SSbnm2

New IG report shows why the Pentagon can sometimes have buyer’s remorse

In today’s Federal Newscast, the Defense Department wasted an estimated $5 million in a single year by buying items it already had in its inventory.
http://news.poseidon-us.com/SSZtfK

Photos: Infosecurity Europe 2022, part 1

Infosecurity Europe 2022 opened its doors today at the ExCeL in London. Here’s a look at the event, the featured vendors are: Arctic Wolf Networks, Bridewell, Checkmarx, Cisco, CrowdStrike, Cybereason, Hornetsecurity, (ISC)², Mimecast, Netskope, OneTrust, and Splunk. The post Photos: Infosecurity Europe 2022, part 1 appeared first on Help Net Security.
http://news.poseidon-us.com/SSZB10