Tuesday, June 6, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

Supply chain efficiency starts with securing port operations

Researcher by Researcher
March 15, 2022
in Internet Of Things
0
Supply chain efficiency starts with securing port operations
203
SHARES
1.6k
VIEWS
Share on FacebookShare on Twitter


Anyone who still needed convincing that port modernization is vital got it during the COVID-19 pandemic. One image in particular stays with me. On November 19, 2021, more than 100 ships were waiting to dock at the Ports of Los Angeles and Long Beach. Some had been idling for two months, disrupting global supply chains and dirtying the air.

Now is a great time to modernize. In the U.S., for example, port authorities and terminal operators are eligible for funding through the Bipartisan Infrastructure Law. The U.S. Army Corps will receive $14 billion for ports, waterway, and coastal investments.

Related articles

NVIDIA announces new class of supercomputer, other AI-focused services

NVIDIA announces new class of supercomputer, other AI-focused services

June 1, 2023
Have your conversations instantly translated in up to 50 languages for just $89.99

Have your conversations instantly translated in up to 50 languages for just $89.99

May 29, 2023

Picturing modern port operations

Here’s some of what’s possible with modern port networks:

  • Faster vessel loading and unloading. Load straddle carriers, terminal tractors, reach stackers, cranes, and other handling vehicles with OCR scanners, HD cameras, and navigation systems—all connected to the terminal operations system (TOS) to give drivers real-time instructions.
  • Safer working conditions with automated guided vehicles (AGV) or tele-remote operation of container-handling equipment.
  • Improved equipment uptime, achieved by transmitting and analyzing real-time vehicle telemetry to predictive maintenance applications.

It takes an ultra-reliable wireless network

The networks supporting modern port operations need very high reliability and low latency. Wi-Fi is perfect to connect in-vehicle devices. But it wasn’t designed to connect moving vehicles to real-time applications—much less in large areas with tall container stacks. I’ve been working with a port authority whose Wi-Fi coverage was so spotty that rubber-tired gantry (RTG) operators drove to the non-operational areas after each assignment to pick up instructions for the next. Meanwhile, containers stayed still—and so did ships. Since that operator deployed Cisco Ultra-Reliable Wireless Backhaul, vehicles are always connected to the TOS so that drivers can see the next task from wherever they are. Productivity has skyrocketed.

Consider cybersecurity from the start

With better connectivity comes more opportunities… and more cyber threats. A reminder came in late February 2022, when a ransomware attack disrupted one of India’s largest container terminals, forcing it to divert vessels to other terminals. Just a few months earlier, suspected foreign government-backed hackers breached a computer network at the Port of Houston. Fortunately, early detection prevented the intruders to disrupt shipping operations.

Like traditional enterprise networks, port networks need effective perimeter security based on firewalls and malware detection, but don’t buy into the myth that perimeter security is enough! Ports and terminals are open environments, involving numerous contractors and some outdated technologies. To put the right defenses in place—such as patching vulnerable software and segmenting the network to prevent attacks from spreading to disrupt the entire operation—you need to first identify every connected asset. You also need to monitor industrial communications to detect abnormal behaviors and raise alerts before it’s too late.

This is exactly what Cisco Cyber Vision is designed to do. Built right into the industrial switches installed in cranes and vehicle, it automatically takes a precise inventory to show everything connected to your network. You can see right away, for example, if a contractor has connected an unauthorized wireless access point that could give an attacker a foothold. Cyber Vision also calculates a risk score for each asset so that you know what to fix to reduce the attack surface and keep cargo moving. This visibility is shared with your IT security tools so that you can create and enforce policies restricting which assets can talk to each other. (Not a quayside camera and a database, for instance.)

Come see our port security solution in action at “Hack the Port 22,” March 21-25, 2022

We’ll be demonstrating how to use Cyber Vision to secure port operations at Hack the Port 22, a cybersecurity event put on by Maryland Innovation and Security Institute (MISI) and DreamPort, inspired by U.S. Cyber Command. This year’s event will be held virtually and in person at the Greater Ft. Lauderdale Convention Center. I invite you to tune into my presentation on Monday, March 21, Wireless at a Port, is it Magic, Science, or a Mystery? If you attend in person, please introduce yourself!

Learn more

Share:



Source link

Tags: chainefficiencyOperationsportSecuringStartssupply
Share81Tweet51

Related Posts

NVIDIA announces new class of supercomputer, other AI-focused services

NVIDIA announces new class of supercomputer, other AI-focused services

June 1, 2023
0

The NVIDIA DGX supercomputer using GH200 Grace Hopper Superchips could be the top of its class. Learn what this and...

Have your conversations instantly translated in up to 50 languages for just $89.99

Have your conversations instantly translated in up to 50 languages for just $89.99

May 29, 2023
0

Never worry about language barriers again; just use the AI-powered Peiko Generation 2 Wireless Translator Earbuds that allow you to...

A new unified networking solution for enterprises

A new unified networking solution for enterprises

May 27, 2023
0

Image: Ar_TH/Adobe Stock Networking has long been the holdout in enterprise aspirations toward high-performance, multicloud or hybrid architectures. While such...

Sustainable solutions to tackle tech plastic waste

Sustainable solutions to tackle tech plastic waste

May 27, 2023
0

https://www.youtube.com/watch?v=yyRkFPtgQYg This is the first installment of TechRepublic’s Tech Impact video series. The following is an edited transcript of the...

Add an AI chatbot like Google Bard to your brainstorming process

Add an AI chatbot like Google Bard to your brainstorming process

May 22, 2023
0

Leverage prompts in your brainstorming process to benefit from the strengths of exploration engines such as Google Bard. Image:...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023
BNP Paribas and NatWest Go Live with CobaltFX’s ‘Dynamic Credit’ for FX Credit Management

BNP Paribas and NatWest Go Live with CobaltFX’s ‘Dynamic Credit’ for FX Credit Management

June 5, 2023

Recent Posts

Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved