Quantcast
Channel: Fred Gordy – ControlTrends
Browsing all 33 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Fred Gordy Asks– Are You Ready to React or Pre-Act? Critical Information...

Cyber Evangelist and Cyber Security Advocate Fred Gordy delivers another critical collection of cyber security and cyber terrorism information — as it pertains the building management systems’ world....

View Article



Image may be NSFW.
Clik here to view.

Cyber Security Terms and Definition – Part 1

Just like in the controls industry, cybersecurity has its share of acronyms, terms, etc. Wading through these can be overwhelming. The list below is some of the terms you may have heard or probably...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Terms and Definitions – Part 2

The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will hear sometime in the near future. I am not sure how many of...

View Article

Are You Patching The Humans In Your Control System?

Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes (view 60 Minutes segment) “Can the...

View Article

Image may be NSFW.
Clik here to view.

Real-Time Threat Maps

If you haven’t seen these maps, it can be eye opening.  These are real-time and/or near real-time threat maps that are readily available online.    They cover traffic such as: DDoS (distributed denial...

View Article


Image may be NSFW.
Clik here to view.

Shodan – Are Your Sites Listed?

If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it.  Shodan has been called the “Google” for the internet of things (IoT).   Shodan is continually...

View Article

Image may be NSFW.
Clik here to view.

Data Center Equipment Exposed With Default Manufacturer User and Pass

Shodan Cataloging of Liebert & APC (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor.  The intent is to show that we, the system integrator, still have...

View Article

Image may be NSFW.
Clik here to view.

ICS/SCADA Security Essentials, Atlanta – Billy Rios, Instructor

  My friend and mentor Billy Rios will be the instructor for the upcoming SANS Institute ICS/SCADA Security Essentials in Atlanta, September 28 thru October 2. Billy is not only an expert on this...

View Article


Image may be NSFW.
Clik here to view.

Practical Application for Using Shodan

Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or device.  The intent is to show that we, the system...

View Article


Image may be NSFW.
Clik here to view.

If You’re Breached, You May Be Facing Two Battles

According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that employs poor IT security practices.  This...

View Article

Image may be NSFW.
Clik here to view.

Gateways Aren’t Supervisory Controllers But They Offer A “Greatway” Into Your...

If you haven’t looked at Shodan maps maybe you should. It shows a stark visualization of just how exposed we are. The above image shows all of the Lantronix devices that exposed. In the US alone there...

View Article

Image may be NSFW.
Clik here to view.

We Were IoT Before IoT Was Cool

Control System – Did We Get Left Behind? (originally posted on AutomatedBuildings.com – link to article) Open Source, Plug & Play, IoT, and an Automagically Connected Home, these are terms we hear...

View Article

Image may be NSFW.
Clik here to view.

Cyber Legacy?

I think that the president is looking to use cyber security as a “legacy” play for his last year in office.  It is the one thing that most Americans, regardless of their party affiliation, will agree...

View Article


Image may be NSFW.
Clik here to view.

Announcing SmartCore’s Free, Online Criticality and Threat Assessment (CATA)

  ONLINE ASSESSMENT AT NO CHARGE TO YOU SmartCore has developed an online assessment tool that gives building and portfolio management a high level assessment of each building free of charge. Contact...

View Article

Image may be NSFW.
Clik here to view.

SMARTCORE’s Complimentary Online Threat Assessment Survey

Helps You Identify Vulnerabilities in Your BAS SmartCore will translate your answers to this short survey into a Threat Assessment Scorecard as well as a prescriptive Cyber Risk Mitigation Plan that we...

View Article


Image may be NSFW.
Clik here to view.

System Integrator, Beware and Be Aware

There are a lot of predictions and resources that talk about cyber security for 2016, but not specifically about our industry; building/facility control system integration.  However, intermingled in...

View Article

Image may be NSFW.
Clik here to view.

Where’s The Goat?

If you’ve seen Jurassic Park you probably know what this line.  If you haven’t, the scene is this… There is a goat that is tied to a stake on a platform with a cage around it and raised up from the...

View Article


Image may be NSFW.
Clik here to view.

Do You Know How and What Your Smart Building Devices Are Connected To?

Okay… Your control system was installed a couple of years ago and you were handed riser diagrams, As-Builts, mechanical drawings, etc. and you were good to go.  Right? Maybe… Up until recently the...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Expert Fred Gordy Waives the Cyber Security Caution Flag!...

Thanks once again to Intelligent Buildings’ Director of Cyber Security, Fred Gordy, who keeps the global ControlTrends Community and systems integrators current with his Cyber Security updates. Fred is...

View Article

Image may be NSFW.
Clik here to view.

OPTIGO Networks Webinar: I Can Hack into Your Building. Stop Me. Thursday,...

6 million commercial buildings in the US are believed to be secure. Every single one has exposed building controllers, security cameras and access control systems that an entry level hacker can hack...

View Article
Browsing all 33 articles
Browse latest View live




Latest Images