01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

on legitimate accounts or from legitimate devices, put a virtual patching “shield” around legacy assets<br />

that cannot be patched or replaced, and segment networks so that they’re much more defensible.<br />

The access points (APs) that a train uses <strong>for</strong> mesh or roaming are often running with limited or hardly<br />

any security, enabling intruders to potentially affect the signal control system. An EdgeIPS solution is<br />

perfect <strong>for</strong> deployment between the AP and its switch, preventing attackers from accessing or affecting<br />

the network.<br />

Safeguarding mobile and stand-alone assets<br />

One common way dangerous threats get into OT environments is devices brought on-site by vendors or<br />

maintenance experts. That is why, in addition to routine scans of deployed technology, security experts<br />

recommend using dedicated mobile security devices <strong>for</strong> pre-scans of new devices be<strong>for</strong>e they are<br />

deployed on the network. Such a device can be used to set up a checkpoint where all laptops and other<br />

devices brought on-site are scanned. This requires a solution with the ability to conduct quick scans<br />

without the need <strong>for</strong> software installations so that it can be used <strong>for</strong> checkpoint scans as well as <strong>for</strong><br />

sensitive equipment that cannot accept installations.<br />

How to protect fixed-use and legacy assets<br />

For fixed-use systems such as ticket vending machines and on-board computers, a trust list-based ICS<br />

endpoint protection application is the ideal solution. Even if malware finds its way into a company’s<br />

working hardware, it cannot be executed because of the trust list-based lockdown. For example,<br />

applications, configurations, data, and USB devices are all locked down with a trust list. It excludes all<br />

unlisted applications from running and unlisted users cannot make changes to data or configurations.<br />

Only administrator-approved USB devices can connect to the device, and only an administrator can grant<br />

a device one-time permission to connect.<br />

Conclusion<br />

In today’s world bad actors and criminal organizations prefer to conduct their attacks over the internet<br />

from the com<strong>for</strong>t of their computer chairs – which makes them even more dangerous. To secure daily<br />

operations and maintain passenger confidence, computation must be protected from disruption while<br />

maintaining maximum availability, with no aspect of the exchange using more time or resources than<br />

necessary. This is why specially designed cybersecurity appliances and software are so essential to the<br />

protection of railway subsystems.<br />

Additional in<strong>for</strong>mation can be found at www.txone-networks.com and https://www.txonenetworks.com/white-papers/content/securing-autonomous-mobile-robots<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!