National Grid Welcomed to European CNI Forum

The European Network for Cyber Security (ENCS) has welcomed National Grid as its first UK member, saying the UK’s transmission system operator (TSO) is among Europe’s “most sophisticated” in terms of cybersecurity posture, and its membership will boost knowledge sharing.

The ENCS is a member-led organisation that works to boost the security of EU energy grids and infrastructure in the face of hyperactive probing by bad actors, and, arguably, distinctly half-baked regulation that fails to penalise manufacturers for insecure components.

Among other efforts, ENCS has baked security requirement guidance into procurement cycles across its membership base and developed testing capabilities to risk-assess things like smart metres; this has now expanded to other areas of the grid, like distribution automation and other tools.

Paul Lee, an engineering manager for cyber and control systems at National Grid said in a statement shared by ENCS: “We have robust cybersecurity measures in place across all our operational infrastructure and IT to protect against cyber threats, but our membership will help us to benefit from ENCS knowledge base as we share information with other members, contributing to increased protection across all critical infrastructure”.

ENCS’s MD Nijk said, “Grid infrastructure has evolved with dramatic speed. Partnering with domain operators to build an expert pool is vital to our members need to be fast and effective [in building up their security] instead of waiting for regulations”.

“National Grid already ranks among the most sophisticated TSOs in terms of cyber security, and by joining ENCS, it demonstrates its commitment to that improving even further” he said in a canned statement.

[Source: Computer Business Review]

World Economic Forum report recognizes key critical infrastructure innovations from Smart Wires, ABB and Siemens

The World Economic Forum's International Energy Community has highlighted Smart Wires SmartValveTM as one of the energy sector's influential innovations during the last decade. Winners were chosen based on several criteria including their benefit to society and contribution to accelerating the energy transition.

"Smart Wires is honored that our solutions were included on a very short and prestigious list of technologies recognized as critical enablers of the energy transition," said Gregg Rotenberg, Smart Wires CEO.

Suleman Alli, director of strategy at UK Power Networks, said: "As the first network operator in the UK to trial the Smart Wires' power flow control technology, we are delighted to see it recognised by this World Economic Forum report. Trialling smart solutions like load balancing highlights our commitment to unlocking new capacity for renewable energy safely, cost effectively and quickly."

Smart Wires was recognized for its ability to maximize the grid's transfer capacity which is necessary to enable rapid, low-cost and large-scale connections of new renewables.

Rotenberg reflected, "It is remarkable how much spare capacity exists on today's grids. We regularly find projects where we can release several gigawatts of capacity in under a year without disturbing communities or the environment."

"SmartValve is our solution to maximize the grid's transfer capacity. This technology is causing leading utilities across Europe, Australia and the Americas to change the way they think about future investments in critical infrastructure," Rotenberg said.

Red Cross Calls for Halt to Cyberattacks on Healthcare Infrastructure

The Red Cross has called on hackers and scammers to end their cyber-attacks on health facilities in a letter published.

The letter, also signed by a group of political and business figures, said that attacks endanger human lives, particularly during the Covid-19 pandemic, and governments should take more “immediate and decisive action” to stop them.

Brad Smith, President of Microsoft, and former US Secretary of State Madeleine Albright, are among the 42 co-signers of the letter, which was initiated by the CyberPeace Institute.

In the letter, Peter Maurer, president of the International Committee of the Red Cross, said: “We are hoping that the world’s governments will step up to affirm their commitments to the international rules that prohibit such actions.”

The calls come after an increase in cyber-attacks on critical infrastructure and healthcare facilities during the Covid-19 pandemic, with hackers and scammers eyeing an opportunity to take advantage of a complicated situation.

In April, Interpol warned that cybercriminals have been increasing attacks on healthcare systems, increasing ransomware attacks to hold hospitals to ransom during the spread of Covid-19, despite the work these facilities carry out to save lives.

Interpol Secretary-General, Jürgen Stock, commented: “As hospitals and medical organisations around the world are working non-stop to preserve the well-being of individuals stricken with the coronavirus, they have become targets for ruthless cybercriminals who are looking to make a profit at the expense of sick patients

“Locking hospitals out of their critical systems will not only delay the swift medical response required during these unprecedented times, but it could also directly lead to deaths.

“Interpol continues to stand by its member countries and provide any assistance necessary to ensure our vital healthcare systems remain untouched and the criminals targeting them held accountable.”

Only 36% of critical infrastructures have a high level of cyber resilience

Greenbone Networks revealed the findings of a research assessing critical infrastructure providers’ ability to operate during or in the wake of a cyberattack.

The research investigated the cyber resilience of organizations operating in the energy, finance, health, telecommunications, transport and water industries, located in the world’s five largest economies: UK, US, Germany, France and Japan. Of the 370 companies surveyed, only 36 percent had achieved a high level of cyber resilience.

To benchmark the cyber resilience of these critical infrastructures, the researchers assessed a number of criteria. These included their ability to manage a major cyberattack, their ability to mitigate the impact of an attack, whether they had the necessary skills to recover after an incident, as well as their best practices, policies and corporate culture.

Infrastructure providers in the US were the most likely to score highly, with 50 percent of companies considered highly resilient. In Europe, the figure was lower at 36 percent. In Japan, is was just 22 percent.

Read more >>

[Source: HelpNetSecurity]

Statement from Attorney General William P. Barr Regarding the U.S. Department of State Global CTO Roundtable on 5G Integrated and Open Networks

Attorney General Barr issued the following statement:

“The United States and our partners are in an urgent race against the People’s Republic of China (PRC) to develop and build 5G infrastructure around the world.  Our national security and the flourishing of our liberal democratic values here and around the world depend on our winning it.  Future 5G networks will be a critical piece of global infrastructure, the central nervous system of the global economy.  Unfortunately, the PRC is well on its way to seizing a decisive 5G advantage.  If the PRC wins the 5G race, the geopolitical, economic, and national security consequences will be staggering.

The PRC knows this, which explains why it is using every lever of power to expand its 5G market share around the globe.  The community of free and democratic nations must do the same.

To compete and win against the PRC juggernaut, the United States and its partners must work closely with trusted vendors to pursue practical and realistic strategies that can turn the tide now.  Although the ‘Open RAN’ approach is not a solution to our immediate problem, the concept of Integrated and Open Networks (ION), which was the topic of yesterday’s roundtable, holds promise and should be explored.  We can win the race, but we must act now.”

Health should become EU 'critical infrastructure'

Senior officials are now calling for the EU's disparate healthcare systems to be included as "critical infrastructure" in the light of the interdependencies between member states exposed by the coronavirus pandemic.

A group of officials argue in a new white paper that the existing European Programme for Critical Infrastructure Protection (EPCIP) could now play a key role in EU's public health emergency preparedness.

The signatories include former MEPs, top officials from the EU's External Action Service and former heads of Intelligence Service.

The EPCIP is currently focused on protecting national and European energy and transport infrastructure, although health infrastructure is - in theory - included too.

Critical infrastructures are complex systems - such as pipelines, power plants, stock markets, railways - whose destruction or disruption could lead to significant loss of life or material damage.

However, hospital facilities, laboratories or emergency stockpiles of medical equipment also fit this description - especially when the coronavirus pandemic has shown how some EU countries were forced to rely on others for protective equipment, test and other types of resources.

Full report >>

[Source: EU Observer]

Model Of Critical Infrastructures Reveals Vulnerabilities

An interdisciplinary team of Kansas State University researchers developed a computer simulation that revealed beef supply chain vulnerabilities that need safeguarding — a realistic concern during the COVID-19 pandemic.

Caterina Scoglio, professor, and Qihui Yang, doctoral student, both in electrical and computer engineering, recently published “Developing an agent-based model to simulate the beef cattle production and transportation in southwest Kansas” in Physica A, an Elsevier journal publication.

The paper describes a model of the beef production system and the transportation industry, which are interdependent critical infrastructures — similar to the electrical grid and computer technology. According to the model, disruptions in the cattle industry — especially in the beef packing plants — will affect the transportation industry and together cause great economic harm. The disruptions modeled in the simulation share similarities with how the packing plants have been affected during the COVID-19 pandemic.

“When we first started working on this project, there was a lot of emphasis on studying critical infrastructures; especially ones that are interdependent, meaning that they need to work together with other critical infrastructures,” Scoglio said. “The idea is if there is a failure in one of the systems, it can propagate to the other system, increasing the catastrophic effects.”

Full story at Eurasia Review - https://www.eurasiareview.com/18052020-model-of-critical-infrastructures-reveals-vulnerabilities/

FBI and CISA Warn Against Chinese Targeting of COVID-19 Research Organisations

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a Public Service Announcement today warning organizations researching COVID-19 of likely targeting and network compromise by the People’s Republic of China (PRC). Healthcare, pharmaceutical and research sectors working on COVID-19 response should all be aware they are the prime targets of this activity and take the necessary steps to protect their systems.

China’s efforts to target these sectors pose a significant threat to our nation’s response to COVID-19. This announcement is intended to raise awareness for research institutions and the American public and provide resources and guidance for those who may be targeted.

The FBI requests organizations who suspect suspicious activity contact their local FBI field office. CISA is asking for all organizations supporting the COVID-19 response to partner with the agency in order to help protect these critical response efforts.

Additional technical details regarding the threat will be released in the coming days. CISA and the United Kingdom’s National Cyber Security Agency released a similar alert earlier this month warning of malicious actors targeting COVID-19 response organizations using a tactic of password spraying.

Telcos as a COVID-19 Recovery Engine

Looking to the future, how can telcos be pivotal in driving the global economy forward as the world emerges from the initial phase of the COVID-19 pandemic? This can largely be separated into two major buckets: 1) tactical support for a safe society; and 2) a more strategic role revolving around supporting Gross Domestic Product (GDP) creation in market settings that will have new parameters and effectively be a new paradigm, Post-COVID-19.

In a tactical sense, telcos will be the pivotal axis upon which some of the fundamental societal tools being built will rest. They will provide the backbone for track and trace applications, as well as provide cities with valuable insight on aspects such as location, footfall, and traffic. They will enable the tracking of valuable medicines and protective equipment. They will also enable most workplaces to be flexible in establishing working practices closer to the pre-COVID-19 norm.

The most significant impact that telcos can have is enabling GDP creation through the embracing of technology-driven new working practices. They will be key in enabling a new digital society. Beyond the obvious conclusions that we are likely to see, including more remote working, more virtual meetings, and more virtual teams (all of which will be enabled thanks to the connectivity supplied by telcos), a raft of new solutions could accelerate GDP growth and all will require a robust level of support from the telco community.

Source: Total Telecom - full article here >>

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Researchers warn commercial airplane systems can be spoofed impacting flight safety of nearby aircraft.

The aircraft safety system known as the Traffic Alert and Collision Avoidance System (TCAS) can be coerced into sending an airplane on a mid-air rollercoaster ride – much to the horror of those onboard.

Researchers were able to cobble together an effective method for spoofing the TCAS using a $10 USB-based Digital Video Broadcasting dongle and a rogue transponder, for communicating with aircraft.

“We have shown that careful placing of fake aircraft through rogue transponder broadcasts can cause an aircraft under autopilot control to climb or descend towards legitimate traffic,” wrote Pen Test Partners’ Ken Munro in a blog post outlining his research.

Those “fake aircrafts” can trigger an airplane’s collision avoidance system to kick-in. That will then alert a pilot to either climb in altitude or descend to avoid a mid-air collision. In some cases, mostly on Airbus, researchers said the aircraft automatically follows what is known as the TCAS “Resolution Advisory” (autopilot) and climbs or descends with no input from the pilot.

For the record, Munro’s proof-of-concept attack was conducted on a flight simulator.

Full Story >>

Source: ThreatPost

1 57 58 59 60 61