Evolving Threats and Regulations in Software Supply Chain Security
13 min read
Evolving Threats and Regulations in Software Supply Chain Security
By Eric Byres on February 13, 2024

2023 is in the rearview mirror and 2024 is now well underway. I wanted to post my thoughts on some of the software supply chain trends we saw last year and how they will continue to shape...

Continue Reading
EU Cyber Resilience Act (CRA) Clears Penultimate Step
5 min read
EU Cyber Resilience Act (CRA) Clears Penultimate Step
By Eric Byres on December 8, 2023

On December 3rd, the EU's new Cyber Resilience Act (CRA) got a big step closer to being adopted when the European Parliament and the EU Council reached an agreement on the legislation. It...

Continue Reading
The Wretched State of OT Firmware Patching
4 min read
The Wretched State of OT Firmware Patching
By Eric Byres on October 11, 2023

This blog is a follow-up to our first post on the 2023 Microsoft Digital Defense Report where I described our collaboration with Microsoft on identified exploitable OT vulnerabilities.There...

Continue Reading
Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities
3 min read
Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities
By Eric Byres on October 5, 2023

Earlier this summer, aDolus collaborated with Microsoft on vulnerability analysis and contributed to their Microsoft Digital Defense Report 2023 (MDDR 2023). This report is a significant...

Continue Reading
An Analysis of Generative AI: How to Be Confidently Wrong
7 min read
An Analysis of Generative AI: How to Be Confidently Wrong
By Marcello Delcaro on April 11, 2023

The recent release of the National Cybersecurity Strategy document by the White House prompted me to test Microsoft's new Bing chat feature, which is powered by OpenAI's language model,...

Continue Reading
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
7 min read
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
By Derek Kruszewski on March 16, 2023

Three weeks ago I reported on the first part of the S4x23 SBOM Challenge run by Idaho National Laboratory (INL), which focused on SBOM Creation. Last week I reported on the second part:...

Continue Reading
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
7 min read
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
By Derek Kruszewski on March 8, 2023

Two weeks ago I reported on the first part of the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. The Day 1 goal was for each team to create an accurate SBOM for...

Continue Reading
Three Quick Takeaways from Biden’s National Cybersecurity Strategy
2 min read
Three Quick Takeaways from Biden’s National Cybersecurity Strategy
By Eric Byres on March 2, 2023

NOTE: We were going to publish our second blog of the S4x23 SBOM Challenge today. However, the new National Cybersecurity Strategy was released this morning, and we thought that...

Continue Reading
S4x23 SBOM Challenge — Part 1
10 min read
S4x23 SBOM Challenge — Part 1
By Derek Kruszewski on February 24, 2023

The aDolus Team has just returned from participating in the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. This blog is the first of a series reporting on what we...

Continue Reading
A Flurry of Regulatory Action and the Need for SBOMs
5 min read
A Flurry of Regulatory Action and the Need for SBOMs
By Eric Byres on October 12, 2022

Executive Order 14028 on Improving the Nation's Cybersecurity was issued in May of 2021 and provided a roadmap for a series of regulatory initiatives that government agencies (and anyone...

Continue Reading
A Deeper Dive into VEX Documents
5 min read
A Deeper Dive into VEX Documents
By Derek Kruszewski on April 15, 2022

At the end of last summer, I wrote a blog post explaining the merits of Vulnerability Exploitability eXchange (VEX) documents. Almost 8 months later, I stand by the importance of these...

Continue Reading
How Russia Might Come After the West
2 min read
How Russia Might Come After the West
By Eric Byres on February 25, 2022

The DDoS attack surge that began last week against Ukrainian government agencies and banks was a bad sign. I was actually preparing a post and wondering if it was appropriate to call out...

Continue Reading
Log4j: Panic or Lesson? | How to Protect Deployed Assets
4 min read
Log4j: Panic or Lesson? | How to Protect Deployed Assets
By Ron Brash on December 21, 2021

Cleaning up the Mess will Take a Methodical Approach Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the ...

Continue Reading
Sorry Blackberry: You Are Part of the Supply Chain
2 min read
Sorry Blackberry: You Are Part of the Supply Chain
By Eric Byres on November 2, 2021

Today, reporters Betsy Woodruff Swan and Eric Geller at Politico published a story: “BlackBerry resisted announcing major flaw in software powering cars, hospital equipment.” They outline...

Continue Reading
What is VEX and What Does it Have to Do with SBOMs?
3 min read
What is VEX and What Does it Have to Do with SBOMs?
By Derek Kruszewski on August 12, 2021

Recently, we have been fielding many inquiries here at aDolus regarding “VEX.” If you are not familiar with this mysterious abbreviation, you’ve fortunately landed in the right place....

Continue Reading
NTIA Publishes Minimum Components of an SBOM
4 min read
NTIA Publishes Minimum Components of an SBOM
By Derek Kruszewski on July 15, 2021

In today’s blog post I’d like to recognize all the hard work done by NTIA (National Telecommunications and Information Administration) and congratulate them on publishing the minimum...

Continue Reading
Kaseya Supply Chain Attack on SMBs
4 min read
Kaseya Supply Chain Attack on SMBs
By Eric Byres on July 6, 2021

Last week I participated in a panel discussion on the Executive Order’s Impact On Embedded Device Security hosted by ISSSource.com. I signed off with a comment about my biggest worry: ...

Continue Reading
aDolus Welcomes Mark Weatherford to Board
2 min read
aDolus Welcomes Mark Weatherford to Board
By Norma Dowler on June 23, 2021

Cybersecurity veteran tapped to accelerate growth of ICS supply chain security leader VICTORIA, BC, CANADA, June 23 -- aDolus Technology Inc., a global authority on software intelligence...

Continue Reading
Rod Campbell Joins aDolus as CEO
2 min read
Rod Campbell Joins aDolus as CEO
By Norma Dowler on June 15, 2021

Seasoned financial and advisory executive to drive growth VICTORIA, BC, CANADA, June 15, 2021 /EINPresswire.com/ -- aDolus Technology Inc., a global authority on software intelligence for...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
5 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
By Eric Byres on May 26, 2021

Section 3 - Less Fog, More Cloud Section 3: Modernizing Federal Government Cybersecurity of the Executive Order is all about government agencies moving to the cloud and doing it right. If...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 3
3 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 3
By Eric Byres on May 21, 2021

So you don’t sell to the Feds… Today’s blog is going to take a break from analyzing a specific section of the Executive Order on Improving the Nation’s Cybersecurity and focus on who will...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 2
3 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 2
By Eric Byres on May 18, 2021

Removing Barriers to Sharing Threat Information On Friday we dissected Section 4: Enhancing Software Supply Chain Security of the new Executive Order on Improving the Nation’s Cybersecurity...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 1
4 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 1
By Eric Byres on May 14, 2021

Late Wednesday night President Biden signed the Executive Order on Improving the Nation’s Cybersecurity. Compared to any Executive Order (EO) I’ve seen, this is a massive and complex...

Continue Reading
Verve Industrial and aDolus Partner to Reduce ICS Software Supply Chain Risk
3 min read
Verve Industrial and aDolus Partner to Reduce ICS Software Supply Chain Risk
By Norma Dowler on February 4, 2021

Verve embeds aDolus’ ability to generate SBOMs and validate components aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, today announced its...

Continue Reading
Industrial Defender and aDolus Partner to Improve ICS Supply Chain Security
2 min read
Industrial Defender and aDolus Partner to Improve ICS Supply Chain Security
By Eric Byres on January 19, 2021

Industrial Defender’s integration with the aDolus FACT™ platform ensures updates are valid, tamper-free, and safe to install aDolus Technology Inc., a global authority on software...

Continue Reading
Wrapping Up 2020 with Dale Peterson
2 min read
Wrapping Up 2020 with Dale Peterson
By Eric Byres on January 7, 2021

Wrapping up my year on December 31, I was delighted to join ICS cybersecurity luminary Dale Peterson for his December: ICS Security Month in Review episode of the Unsolicited Response...

Continue Reading
Three Things the SolarWinds Supply Chain Attack Can Teach Us
4 min read
Three Things the SolarWinds Supply Chain Attack Can Teach Us
By Eric Byres on December 18, 2020

Just in case you missed it, a software supply chain attack on the US government and industries is consuming the waking hours of everyone involved in cyber security this week. The attack...

Continue Reading
aDolus Wins Top Tech Innovation Contest, New Ventures BC 2020
2 min read
aDolus Wins Top Tech Innovation Contest, New Ventures BC 2020
By Norma Dowler on December 1, 2020

aDolus Technology Inc. bested 240 of BC’s most innovative tech startups, winning the New Ventures contest in Canada’s #1 startup ecosystem, boasting over 10,000 tech companies. aDolus...

Continue Reading
ReFirm Labs and aDolus Partner to Improve IoT Supply Chain Security
2 min read
ReFirm Labs and aDolus Partner to Improve IoT Supply Chain Security
By Eric Byres on September 3, 2020

aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, and ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security...

Continue Reading
aDolus Technology Selected as One of 2020’s Top 10 Startups
2 min read
aDolus Technology Selected as One of 2020’s Top 10 Startups
By Norma Dowler on August 28, 2020

NANAIMO, BC, CANADA, August 27, 2020: aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, has today announced that New Ventures BC has selected...

Continue Reading
Bayshore Networks and aDolus Forge Supply Chain Security Partnership
3 min read
Bayshore Networks and aDolus Forge Supply Chain Security Partnership
By Norma Dowler on July 23, 2020

The aDolus FACT™ platform provides independent software update validation to ensure safe upgrades and a more secure supply chain NANAIMO, BC, CANADA, July 22, 2020 --aDolus Technology Inc.

Continue Reading
Don’t Judge an Ebook by Its Cover
3 min read
Don’t Judge an Ebook by Its Cover
By Ron Brash on May 12, 2020

Interesting times lead to interesting opportunities. The current pandemic is proving no exception, but, sadly, it’s an opportunity for some attackers who have laid a rather cunning trap. As...

Continue Reading
3 Month Reprieve for Utilities on Cybersecurity Supply Chain Standards
3 min read
3 Month Reprieve for Utilities on Cybersecurity Supply Chain Standards
By Eric Byres on April 21, 2020

Earlier this month, as the coronavirus accelerated its alarming sprint across North America, NERC requested that FERC defer a number of looming deadlines for Reliability Standards....

Continue Reading
Windows 10 Certificate Validation Bug Exposes a Fundamental Weakness
3 min read
Windows 10 Certificate Validation Bug Exposes a Fundamental Weakness
By Eric Byres on January 17, 2020

The announcement Tuesday from the NSA about the new cryptographic vulnerability in the Microsoft Windows operating system sent ripples of shock through our entire community. In case you...

Continue Reading
Sniffing Out Fakes: From Saffron in Marrakech to Digital Certificates
4 min read
Podcast: Where Do Your Bits Really Come From?
3 min read
Podcast: Where Do Your Bits Really Come From?
By Eric Byres on September 26, 2019

Earlier this year I attended the Public Safety Canada Industrial Control System Security symposium in Charlottetown, PEI (FYI the PSC ICS events are outstanding - worth attending, even if...

Continue Reading
Will the DoD’s CMMC Encourage Bad Password Habits?
4 min read
Will the DoD’s CMMC Encourage Bad Password Habits?
By Eric Byres on September 19, 2019

Last Wednesday (September 11), the U.S. Department of Defense released a draft of its Cybersecurity Maturity Model Certification (CMMC) for public comment. The idea is for the DoD to...

Continue Reading
When the Security Researchers Come Knocking, Don’t Shoot the Messenger
3 min read
When the Security Researchers Come Knocking, Don’t Shoot the Messenger
By Eric Byres on November 8, 2018

Our own Jonathan Butts and Billy Rios were interviewed this month on the CBS Morning News about their research showing that medical devices like pacemakers and insulin pumps can be hacked...

Continue Reading
Who Infected Schneider Electrics’ Thumbdrive?
3 min read
Who Infected Schneider Electrics’ Thumbdrive?
By Eric Byres on September 12, 2018

On 24 August 2018 Schneider Electric issued a security notification alerting users that the Communications and Battery Monitoring devices for their Conext Solar Energy Monitoring Systems...

Continue Reading
Building (or Losing) Trust in our Software Supply Chain
3 min read
Building (or Losing) Trust in our Software Supply Chain
By Eric Byres on May 10, 2018

Back in 2014, when I was managing Tofino Security, I became very interested in the Dragonfly attacks against industrial control systems (ICS). I was particularly fascinated with the ways...

Continue Reading
Loading more posts
No more posts to load
1

Stay up to date