Fred Gordy Asks– Are You Ready to React or Pre-Act? Critical Information...
Cyber Evangelist and Cyber Security Advocate Fred Gordy delivers another critical collection of cyber security and cyber terrorism information — as it pertains the building management systems’ world....
View ArticleCyber Security Terms and Definition – Part 1
Just like in the controls industry, cybersecurity has its share of acronyms, terms, etc. Wading through these can be overwhelming. The list below is some of the terms you may have heard or probably...
View ArticleCyber Security Terms and Definitions – Part 2
The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will hear sometime in the near future. I am not sure how many of...
View ArticleAre You Patching The Humans In Your Control System?
Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes (view 60 Minutes segment) “Can the...
View ArticleReal-Time Threat Maps
If you haven’t seen these maps, it can be eye opening. These are real-time and/or near real-time threat maps that are readily available online. They cover traffic such as: DDoS (distributed denial...
View ArticleShodan – Are Your Sites Listed?
If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it. Shodan has been called the “Google” for the internet of things (IoT). Shodan is continually...
View ArticleData Center Equipment Exposed With Default Manufacturer User and Pass
Shodan Cataloging of Liebert & APC (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The intent is to show that we, the system integrator, still have...
View ArticleICS/SCADA Security Essentials, Atlanta – Billy Rios, Instructor
My friend and mentor Billy Rios will be the instructor for the upcoming SANS Institute ICS/SCADA Security Essentials in Atlanta, September 28 thru October 2. Billy is not only an expert on this...
View ArticlePractical Application for Using Shodan
Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or device. The intent is to show that we, the system...
View ArticleIf You’re Breached, You May Be Facing Two Battles
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that employs poor IT security practices. This...
View ArticleGateways Aren’t Supervisory Controllers But They Offer A “Greatway” Into Your...
If you haven’t looked at Shodan maps maybe you should. It shows a stark visualization of just how exposed we are. The above image shows all of the Lantronix devices that exposed. In the US alone there...
View ArticleWe Were IoT Before IoT Was Cool
Control System – Did We Get Left Behind? (originally posted on AutomatedBuildings.com – link to article) Open Source, Plug & Play, IoT, and an Automagically Connected Home, these are terms we hear...
View ArticleCyber Legacy?
I think that the president is looking to use cyber security as a “legacy” play for his last year in office. It is the one thing that most Americans, regardless of their party affiliation, will agree...
View ArticleAnnouncing SmartCore’s Free, Online Criticality and Threat Assessment (CATA)
ONLINE ASSESSMENT AT NO CHARGE TO YOU SmartCore has developed an online assessment tool that gives building and portfolio management a high level assessment of each building free of charge. Contact...
View ArticleSMARTCORE’s Complimentary Online Threat Assessment Survey
Helps You Identify Vulnerabilities in Your BAS SmartCore will translate your answers to this short survey into a Threat Assessment Scorecard as well as a prescriptive Cyber Risk Mitigation Plan that we...
View ArticleSystem Integrator, Beware and Be Aware
There are a lot of predictions and resources that talk about cyber security for 2016, but not specifically about our industry; building/facility control system integration. However, intermingled in...
View ArticleWhere’s The Goat?
If you’ve seen Jurassic Park you probably know what this line. If you haven’t, the scene is this… There is a goat that is tied to a stake on a platform with a cage around it and raised up from the...
View ArticleDo You Know How and What Your Smart Building Devices Are Connected To?
Okay… Your control system was installed a couple of years ago and you were handed riser diagrams, As-Builts, mechanical drawings, etc. and you were good to go. Right? Maybe… Up until recently the...
View ArticleCyber Security Expert Fred Gordy Waives the Cyber Security Caution Flag!...
Thanks once again to Intelligent Buildings’ Director of Cyber Security, Fred Gordy, who keeps the global ControlTrends Community and systems integrators current with his Cyber Security updates. Fred is...
View ArticleOPTIGO Networks Webinar: I Can Hack into Your Building. Stop Me. Thursday,...
6 million commercial buildings in the US are believed to be secure. Every single one has exposed building controllers, security cameras and access control systems that an entry level hacker can hack...
View Article
More Pages to Explore .....