Author: Jane Edwards|| Date Published: December 29, 2020
Researchers recently discovered a series of cyber vulnerabilities dubbed Ripple20 in a common networking stack that poses risks to mission-critical devices and Erik Floden, director of federal civilian agencies at Forescout Technologies, said security teams at agencies should take steps to address the risk.
One of the measures Floden suggested is identifying all vulnerable devices.
“Unfortunately, many agencies don’t know all the devices connected to their networks. But that needs to change because the inability to identify characteristic network signatures of devices using Treck can be a huge weakness,” Floden wrote.
Other measures agencies should conduct are applying a patch from the device’s vendor, continuously monitoring a vulnerable device’s behavior until a patch is ready and automating response and remediation workflows.
Floden also cited the convergence of security strategies and leadership for information technology and operational technology and the need for agencies to immediately screen their IT environments for cyber risks.
The Naval Information Warfare Center Pacific is soliciting proposals for the development and fielding of intelligence, surveillance and reconnaissance systems…
The Department of War is accelerating its push into unmanned systems, moving beyond experimentation toward large-scale production, streamlined acquisition and…
BAE Systems has received a $117.7 million contract modification from the U.S. Navy to support depot-level modernization, maintenance and repair of USS…
Advanced wireless infrastructure is becoming as strategically important as artificial intelligence in modern defense operations 5G standalone enables network slicing,…