Author: Jane Edwards|| Date Published: December 29, 2020
Researchers recently discovered a series of cyber vulnerabilities dubbed Ripple20 in a common networking stack that poses risks to mission-critical devices and Erik Floden, director of federal civilian agencies at Forescout Technologies, said security teams at agencies should take steps to address the risk.
One of the measures Floden suggested is identifying all vulnerable devices.
“Unfortunately, many agencies don’t know all the devices connected to their networks. But that needs to change because the inability to identify characteristic network signatures of devices using Treck can be a huge weakness,” Floden wrote.
Other measures agencies should conduct are applying a patch from the device’s vendor, continuously monitoring a vulnerable device’s behavior until a patch is ready and automating response and remediation workflows.
Floden also cited the convergence of security strategies and leadership for information technology and operational technology and the need for agencies to immediately screen their IT environments for cyber risks.
Client Solution Architects has appointed Ellen Barletto as chief growth officer, expanding her leadership responsibilities after nearly two decades with…
Brian Meyer, federal field chief technology officer at Axonius Federal, said cybersecurity asset management could help government agencies make dozens…
“Technology transformation company Red River has acquired Invictus International Consulting to expand its cybersecurity and enterprise modernization capabilities to support…
Synergy ECP, a software engineering, cybersecurity and systems engineering services provider, has acquired NetServices, a company offering secure, mission-focused technology services. The…