June 20, 2022
It has been 10 years since Project Basecamp, a research project conducted by Digital Bond that investigated how critical operational technology (OT) devices and protocols were, to use the term they coined, “insecure by design.” Since then, we have seen hugely impactful real-world OT malware such as Industroyer, TRITON, Industroyer2 and INCONTROLLER abusing insecure-by-design functionality. In collaboration with CISA’s vulnerability disclosure process, Forescout’s Vedere Labs today is disclosing OT:ICEFALL, a set of 56 vulnerabilities affecting devices from 10 OT vendors. Why “Icefall”? That’s the name of the second stop on the Everest route, after Base Camp, and given the rising number of OT vulnerability disclosures, we know we have a mountain to climb to secure these devices and protocols. Learn More...
December 13, 2021
One of the primary sources for Zero Trust standards is NIST 800-207. This directive outlines a set of substantive Zero Trust architectures and deployment models that agencies can follow, but they aren’t a one-size-fits-all solution. It’s important to remember Zero Trust is a security design approach and not a single, fixed solution or technology that can be purchased and implemented. The core concept behind Zero Trust is to “never trust, always verify” and must be applied and adapted to every part of an agency’s infrastructure. This often requires a layered solution approach, particularly when it comes to the Internet of Things (IoT). Learn more…
April 8, 2020
In this final post of our series, we’ll discuss the fifth Function of the NIST Cybersecurity Framework, Recover. This Function requires organizations to develop and implement activities to restore capabilities or services that were impaired due to a cybersecurity event. To comply, organizations need to put a recovery plan into place to get back to their last “known good” state, be able to coordinate restoration activities with external parties and incorporate lessons learned into an updated recovery strategy. Learn More...
April 6, 2020
Forescout is actively engaged with the defense contractor community to implement Cybersecurity Maturity Model Certification (CMMC) controls. Forescout’s core capabilities that are of particular interest to defense contractors considering the CMMC include: identifying and assessing devices on networks, controlling access to and within the network and addressing many found vulnerabilities—whether by directly remediating, initiating remediation actions or quarantining devices. In Forescout’s experience, most defense contractors lack awareness of approximately fifty percent of the connected devices on their networks before they deploy the Forescout platform. Learn More...
March 24, 2020
We are in unprecedented times, navigating a new reality where business is largely being conducted remotely, outside of a secure office network. As strange as it feels to many, it’s something I’ve been preparing for over 10 years. In 2009, I was part of a team that built the UK Pandemic Flu service designed to provide clinical evaluations for a vaccine in the event of an outbreak. My team worked alongside the UK Chief Medical Officer to better understand how to create a resilient IT service and support function to operate during a pandemic outbreak. Today, it feels surreal that many of those theoretical implications are now coming true. Learn More...
March 19, 2020
While we’re restricting travel and working remotely, we want to help you with your security needs so you can stay focused on what is most important – the health and safety of your teams, family and friends. Whether it is to secure your remote access program, ensure onsite and offsite device hygiene, or automate tasks due to reduced IT capacity, we’re here to support our customer and partner community. Learn More...
March 18, 2020
Securing any network begins with understanding every connected user and device and every bit of data they are trying to access. This is a basic premise of any security framework—including Zero Trust. Clearly, you need to know who is trying to access what before you can create appropriate enforcement policies and controls. Learn More...
March 5, 2020
Today, running a healthy hospital means much more than curing diseases and fixing broken bones. It also means making sure the underlying technology is strong and secure enough to support those operations. Hospitals, clinics, and other healthcare organizations are adding more connected devices to their networks than ever before. These devices add significant benefits, like the increased ability to monitor patients with real-time results from medical scans. Learn More...
COVID-19 makes organizations confront the reality that their network boundaries no longer end with their own infrastructure but now extend to employees’ homes. Underscoring this is the Office of Management and Budget’s request that federal agencies “offer maximum telework flexibilities to all current telework eligible employees, consistent with operational needs of the departments and agencies.” To maintain continuity of operations, government organizations must move toward a new network security paradigm that distrusts all devices and users and denies them access to network resources until they have demonstrated the requisite level of security and authorization. That strategic initiative is called “zero trust.” Learn More...