ReFirm Labs and aDolus Partner to Improve IoT Supply Chain Security

aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, and ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security solutions, today announced an integration partnership to improve the security and integrity of firmware for IoT devices in critical industries.

Read More

aDolus Technology Selected as One of 2020’s Top 10 Startups

NANAIMO, BC, CANADA, August 27, 2020: aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, has today announced that New Ventures BC has selected the company as one of the top 10 new ventures for 2020 in the NVBC competition.  

Read More

Bayshore Networks and aDolus Forge Supply Chain Security Partnership

The aDolus FACT™ platform provides independent software update validation to ensure safe upgrades and a more secure supply chain

NANAIMO, BC, CANADA, July 22, 2020 -- aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, today announced its partnership with Bayshore Networks, the leading provider of active protection cybersecurity solutions to protect the safety and integrity of industrial and critical...

Read More

Don’t Judge an Ebook by Its Cover

Interesting times lead to interesting opportunities. The current pandemic is proving no exception, but, sadly, it’s an opportunity for some attackers who have laid a rather cunning trap. As you no doubt know, supply chain security typically focuses on firmware and installers. However, in the course of researching vendor documentation, we saw a clever technique being utilized by attackers targeting critical infrastructure and industrial asset...

Read More

3 Month Reprieve for Utilities on Cybersecurity Supply Chain Standards

Earlier this month, as the coronavirus accelerated its alarming sprint across North America, NERC requested that FERC defer a number of looming deadlines for Reliability Standards. For the cybersecurity-related standards (CIP-005-6, CIP-010-3, and CIP-013-1), NERC requested a 3-month delay to “help ensure grid reliability amid the impacts posed by the coronavirus outbreak, a public health emergency that is unprecedented in modern times.”

Read More

Windows 10 Certificate Validation Bug Exposes a Fundamental Weakness

The announcement Tuesday from the NSA about the new cryptographic vulnerability in the Microsoft Windows operating system sent ripples of shock through our entire community. In case you missed it, this devastating vulnerability (CVE-2020-0601) allows attackers to bypass trust mechanisms to falsify certificates, making them appear to come from a trusted source. It also allows attackers to falsely authenticate themselves on vulnerable HTTPS...

Read More

Sniffing Out Fakes: From Saffron in Marrakech to Digital Certificates

Eric Byres in Morocco
Read More

Podcast: Where Do Your Bits Really Come From?

Earlier this year I attended the Public Safety Canada Industrial Control System Security symposium in Charlottetown, PEI (FYI the PSC ICS events are outstanding - worth attending, even if you are not Canadian). While there, I had a chance to meet with an old friend, Andrew Ginter, Vice President of Industrial Security at Waterfall Security Solutions. We chatted about an issue I’ve been interested in – or, dare I say, obsessed with – for a while...

Read More

Will the DoD’s CMMC Encourage Bad Password Habits?

Last Wednesday (September 11), the U.S. Department of Defense released a draft of its Cybersecurity Maturity Model Certification (CMMC) for public comment. The idea is for the DoD to create a unified framework for defense contractor cybersecurity.

Read More

When the Security Researchers Come Knocking, Don’t Shoot the Messenger

Our own Jonathan Butts and Billy Rios were interviewed this month on the CBS Morning News about their research showing that medical devices like pacemakers and insulin pumps can be hacked by… basically anybody.  These devices all contain embedded controllers, but unlike most modern computer technologies, they haven’t been designed with security in mind.

Read More