探花视频



Forescout Technologies Inc Blogs

OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT

June 20, 2022

It has been 10 years since Project Basecamp, a research project conducted by Digital Bond that investigated how critical operational technology (OT) devices and protocols were, to use the term they coined, 鈥渋nsecure by design.鈥 Since then, we have seen hugely impactful real-world OT malware such as Industroyer, TRITON, Industroyer2 and INCONTROLLER abusing insecure-by-design functionality. In collaboration with CISA鈥檚 vulnerability disclosure process, Forescout鈥檚 Vedere Labs today is disclosing OT:ICEFALL, a set of 56 vulnerabilities affecting devices from 10 OT vendors. Why 鈥淚cefall鈥? That鈥檚 the name of the second stop on the Everest route, after Base Camp, and given the rising number of OT vulnerability disclosures, we know we have a mountain to climb to secure these devices and protocols.

Using Zero Trust to Prevent Agency Ransomware Attacks

December 13, 2021

One of the primary sources for Zero Trust standards is . This directive outlines a set of substantive Zero Trust architectures and deployment models that agencies can follow, but they aren’t a one-size-fits-all solution. It’s important to remember Zero Trust is a security design approach and not a single, fixed solution or technology that can be purchased and implemented. The core concept behind Zero Trust is to “never trust, always verify” and must be applied and adapted to every part of an agency’s infrastructure. This often requires a layered solution approach, particularly when it comes to the Internet of Things (IoT).

How to Jumpstart Your NIST Cybersecurity Framework Maturity: Recover Function

April 8, 2020

In this final post of our series, we’ll discuss the fifth Function of the , Recover. This Function requires organizations to develop and implement activities to restore capabilities or services that were impaired due to a cybersecurity event. To comply, organizations need to put a recovery plan into place to get back to their last “known good” state, be able to coordinate restoration activities with external parties and incorporate lessons learned into an updated recovery strategy.

Inability to Account for Networked Assets Will Hinder Defense Contractors鈥 Achievement of CMMC

April 6, 2020

Forescout is actively engaged with the defense contractor community to implement  controls. Forescout’s core capabilities that are of particular interest to defense contractors considering the CMMC include: identifying and assessing devices on networks, controlling access to and within the network and addressing many found vulnerabilities—whether by directly remediating, initiating remediation actions or quarantining devices. In Forescout’s experience, most defense contractors lack awareness of approximately fifty percent of the connected devices on their networks before they deploy the Forescout platform.

5 Questions for It Professionals to Adapt to Today鈥檚 Remote Working Environment

March 24, 2020

We are in unprecedented times, navigating a new reality where business is largely being conducted remotely, outside of a secure office network. As strange as it feels to many, it’s something I’ve been preparing for over 10 years. In 2009, I was part of a team that built the UK Pandemic Flu service designed to provide clinical evaluations for a vaccine in the event of an outbreak. My team worked alongside the UK Chief Medical Officer to better understand how to create a resilient IT service and support function to operate during a pandemic outbreak. Today, it feels surreal that many of those theoretical implications are now coming true.

Keeping Our Forescout Family Secure During COVID-19

March 19, 2020

While we’re restricting travel and working remotely, we want to help you with your security needs so you can stay focused on what is most important – the health and safety of your teams, family and friends. Whether it is to secure your remote access program, ensure onsite and offsite device hygiene, or automate tasks due to reduced IT capacity, we’re here to support our customer and partner community.

Embracing Zero Trust for IOT and OT: A Fundamental Mind Shift

March 18, 2020

Securing any network begins with understanding every connected user and device and every bit of data they are trying to access. This is a basic premise of any security framework—including Zero Trust. Clearly, you need to know who is trying to access what before you can create appropriate enforcement policies and controls.

A Healthy Hospital Is Founded on 5 Key Cyber Principles

March 5, 2020

Today, running a healthy hospital means much more than curing diseases and fixing broken bones. It also means making sure the underlying technology is strong and secure enough to support those operations. Hospitals, clinics, and other healthcare organizations are adding more connected devices to their networks than ever before. These devices add significant benefits, like the increased ability to monitor patients with real-time results from medical scans.

COVID-19 Should Prompt Enterprises to Move Quickly to Zero Trust

COVID-19 makes organizations confront the reality that their network boundaries no longer end with their own infrastructure but now extend to employees’ homes. Underscoring this is the Office of Management and Budget’s request that federal agencies “offer maximum telework flexibilities to all current telework eligible employees, consistent with operational needs of the departments and agencies.” To maintain continuity of operations, government organizations must move toward a new network security paradigm that distrusts all devices and users and denies them access to network resources until they have demonstrated the requisite level of security and authorization. That strategic initiative is called “zero trust.”