Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

Supply chain efficiency starts with securing port operations

Researcher by Researcher
March 15, 2022
in Internet Of Things
0
Supply chain efficiency starts with securing port operations
208
SHARES
1.6k
VIEWS
Share on FacebookShare on Twitter


Anyone who still needed convincing that port modernization is vital got it during the COVID-19 pandemic. One image in particular stays with me. On November 19, 2021, more than 100 ships were waiting to dock at the Ports of Los Angeles and Long Beach. Some had been idling for two months, disrupting global supply chains and dirtying the air.

Now is a great time to modernize. In the U.S., for example, port authorities and terminal operators are eligible for funding through the Bipartisan Infrastructure Law. The U.S. Army Corps will receive $14 billion for ports, waterway, and coastal investments.

Related articles

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023
Old routers reveal corporate secrets

Old routers reveal corporate secrets

September 16, 2023

Picturing modern port operations

Here’s some of what’s possible with modern port networks:

  • Faster vessel loading and unloading. Load straddle carriers, terminal tractors, reach stackers, cranes, and other handling vehicles with OCR scanners, HD cameras, and navigation systems—all connected to the terminal operations system (TOS) to give drivers real-time instructions.
  • Safer working conditions with automated guided vehicles (AGV) or tele-remote operation of container-handling equipment.
  • Improved equipment uptime, achieved by transmitting and analyzing real-time vehicle telemetry to predictive maintenance applications.

It takes an ultra-reliable wireless network

The networks supporting modern port operations need very high reliability and low latency. Wi-Fi is perfect to connect in-vehicle devices. But it wasn’t designed to connect moving vehicles to real-time applications—much less in large areas with tall container stacks. I’ve been working with a port authority whose Wi-Fi coverage was so spotty that rubber-tired gantry (RTG) operators drove to the non-operational areas after each assignment to pick up instructions for the next. Meanwhile, containers stayed still—and so did ships. Since that operator deployed Cisco Ultra-Reliable Wireless Backhaul, vehicles are always connected to the TOS so that drivers can see the next task from wherever they are. Productivity has skyrocketed.

Consider cybersecurity from the start

With better connectivity comes more opportunities… and more cyber threats. A reminder came in late February 2022, when a ransomware attack disrupted one of India’s largest container terminals, forcing it to divert vessels to other terminals. Just a few months earlier, suspected foreign government-backed hackers breached a computer network at the Port of Houston. Fortunately, early detection prevented the intruders to disrupt shipping operations.

Like traditional enterprise networks, port networks need effective perimeter security based on firewalls and malware detection, but don’t buy into the myth that perimeter security is enough! Ports and terminals are open environments, involving numerous contractors and some outdated technologies. To put the right defenses in place—such as patching vulnerable software and segmenting the network to prevent attacks from spreading to disrupt the entire operation—you need to first identify every connected asset. You also need to monitor industrial communications to detect abnormal behaviors and raise alerts before it’s too late.

This is exactly what Cisco Cyber Vision is designed to do. Built right into the industrial switches installed in cranes and vehicle, it automatically takes a precise inventory to show everything connected to your network. You can see right away, for example, if a contractor has connected an unauthorized wireless access point that could give an attacker a foothold. Cyber Vision also calculates a risk score for each asset so that you know what to fix to reduce the attack surface and keep cargo moving. This visibility is shared with your IT security tools so that you can create and enforce policies restricting which assets can talk to each other. (Not a quayside camera and a database, for instance.)

Come see our port security solution in action at “Hack the Port 22,” March 21-25, 2022

We’ll be demonstrating how to use Cyber Vision to secure port operations at Hack the Port 22, a cybersecurity event put on by Maryland Innovation and Security Institute (MISI) and DreamPort, inspired by U.S. Cyber Command. This year’s event will be held virtually and in person at the Greater Ft. Lauderdale Convention Center. I invite you to tune into my presentation on Monday, March 21, Wireless at a Port, is it Magic, Science, or a Mystery? If you attend in person, please introduce yourself!

Learn more

Share:



Source link

Tags: chainefficiencyOperationsportSecuringStartssupply
Share83Tweet52

Related Posts

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023
0

Plus, Intel makes progress on its plan to revolutionize manufacturing with the 18A process node slated for 2024. Intel Core...

Old routers reveal corporate secrets

Old routers reveal corporate secrets

September 16, 2023
0

ESET Research When decommissioning their old hardware, many companies 'throw the baby out with the bathwater' 18 Apr 2023  • ...

Will you give X your biometric data? – Week in security with Tony Anscombe

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

September 16, 2023
0

Video The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT...

Will you give X your biometric data? – Week in security with Tony Anscombe

Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe

September 16, 2023
0

Video What have some of the world's most infamous advanced threat actors been up to and what might be the...

5 free OSINT tools for social media research

5 free OSINT tools for social media research

September 16, 2023
0

Social Media A roundup of some of the handiest tools for the collection and analysis of publicly available data from...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved