Using evolutionary game theory to mitigate ransomware risks

Ransomware attacks on enterprise IT systems — especially those that are integrated with operational technology (OT) — can cause major disruptions for critical industry sectors, cautions a new cybersecurity whitepaper. Not only does ransomware create unusable file systems, but these attacks disrupt production and distribution of goods, and services and end up costing industries millions of dollars in total losses. The whitepaper, produced by Dragos, describes how IT security leaders can apply evolutionary game theory (EGT) to the complex series of events that lead to a ransomware attack. The paper proposes a mathematical approach to predict behaviors and understand how relationships between a system’s parts give rise to its collective behaviors. “Ransomware has become the primary attack vector for many industrial organizations during 2021,” shares the white paper, and “incidents like Colonial Pipeline, Honeywell and JB Foods showed the world that even when industrial control systems, which are integrated with […]

The post Using evolutionary game theory to mitigate ransomware risks appeared first on CyberScoop.

Continue reading Using evolutionary game theory to mitigate ransomware risks

The benefits of understanding industrial technology

As enterprises invest in digital transformation, industrial cybersecurity will increasingly serve as the critical enabler for safely and securely advancing business goals through technological innovation. While this transformation of operational technology (OT) provides significant benefits, they can be diminished by increased cyber security risk. A new report, “An Executive’s Guide to Industrial Cybersecurity,” produced by Dragos, breaks down how organizations can better secure operational technology systems. The report looks at: How digital transformation and connectivity increase risk and exposure How the OT threat landscape is growing rapidly and increasing in sophistication Why remediating OT vulnerabilities requires a different approach than IT vulnerabilities Next steps executives should take to assess and address the unique challenges of OT cybersecurity Learn more about the key components to keep your operational technology secure. This article was produced by CyberScoop for, and sponsored by, Dragos.

The post The benefits of understanding industrial technology appeared first on CyberScoop.

Continue reading The benefits of understanding industrial technology

Inadequate Cybersecurity

It is customary to begin an article on cybersecurity with statements about huge increases in threats and attacks and mounting cyberspace losses from fraud, identity theft, ransoms, data exfiltration, blackmail, etc. Few, who confront cyber issues daily… Continue reading Inadequate Cybersecurity

Can Third-Party Security Programs Prevent the Next SolarWinds?

While the U.S. government was focused on election security last year, unbeknownst to senior American officials a secret cyber espionage campaign by a major nation-state adversary of unprecedented magnitude was already underway – lethal, stealthy… Continue reading Can Third-Party Security Programs Prevent the Next SolarWinds?

Cybersecurity Lessons from the Pandemic: Perception of Risk

The more “mature” among us may recall when decision-making under uncertainty was based on the concept of “rational economic man.” We estimated or calculated the probability and amount of a loss (or gain) of various courses of action, multiplied the num… Continue reading Cybersecurity Lessons from the Pandemic: Perception of Risk

Cybersecurity Lessons from the Pandemic: Models and Predictions

There are a number of different types of models—and the output from each must be viewed and used differently depending on the form of the model. First, you have relationships derived from correlations—they show how one variable changes in concert with … Continue reading Cybersecurity Lessons from the Pandemic: Models and Predictions

Truth, Trust and Cybersecurity Risk

It is a sad reflection on the times, but it is becoming increasingly difficult to distinguish among true and false “facts,” accurate and misleading interpretations, and personal and politically-expedient beliefs. In my November 11, 2019 Blo… Continue reading Truth, Trust and Cybersecurity Risk

Cybersecurity Risk Management … Beyond the “Golden Period”

Where do we stand with the management of cybersecurity risk? Answer … Not in a good place. This position was further augmented upon reading an article in the January 23, 2020 Washington Post by Anna Fifield with the title “Wuhan quarantine … Continue reading Cybersecurity Risk Management … Beyond the “Golden Period”

ThreatList: Admin Rights for Third Parties is the Norm

The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place. Continue reading ThreatList: Admin Rights for Third Parties is the Norm