article thumbnail

Oldsmar’s Cyber Attack Raises the Alarm for the Water Industry

Cisco Security

In the United States, the America’s Water Infrastructure Act (AWIA) requires water utilities serving more than 3,300 people to develop or update risk assessments and Emergency Response Plans (ERPs). This, and other recommendations, are well described in the whitepaper Cisco recently published on cybersecurity for water utilities.

article thumbnail

MITRE ATT&CK: The Magic of Segmentation

Cisco Security

MITRE is well aware of supply chain risks, and they’re not alone. It relies on a policy tightrope: Too loose, and your organization remains at risk. Check out our detailed whitepaper that maps all of our solutions to ATT&CK Enterprise, posted to our Cyber Frameworks page. Not new, but easily overlooked. And the best part?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Bug Report – November Edition

McAfee

Palo Alto Networks (PAN) firewalls that use its GlobalProtect Portal VPN running PAN-OS versions older than 8.1.17 Randori initially reported over 70,000 internet-accessible PAN firewalls running vulnerable versions of PAN-OS according to Shodan , which it later amended to 10,000. PAN GlobalProtect VPN: CVE-2021-3064 . What is it?

DNS 90
article thumbnail

MITRE ATT&CK: The Magic of Application Mitigations

Cisco Security

Complexity breeds security risk. The quantity and frequency of hacker attacks,” says Cisco VP Al Huger , “coupled with the typical time to identify and contain a breach, then multiplied by the various applications running on-prem, multi-cloud and cloud-native microservices, security risk remains a major challenge.”. “The Trustworthy.

article thumbnail

Establishing an IAM Blueprint for Securing Manufacturing Environments

Thales Cloud Protection & Licensing

The convergence of IT and OT domains have opened once-siloed OT systems to a new world of threats and risks. Once an attacker establishes a foothold on a business system, they can implement reconnaissance and privilege escalation to pivot into the OT domain, bypassing firewalls or other network controls. Identity & Access Management.