Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

Supply chain efficiency starts with securing port operations

Researcher by Researcher
March 15, 2022
in Internet Of Things
0
Supply chain efficiency starts with securing port operations
199
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Anyone who still needed convincing that port modernization is vital got it during the COVID-19 pandemic. One image in particular stays with me. On November 19, 2021, more than 100 ships were waiting to dock at the Ports of Los Angeles and Long Beach. Some had been idling for two months, disrupting global supply chains and dirtying the air.

Now is a great time to modernize. In the U.S., for example, port authorities and terminal operators are eligible for funding through the Bipartisan Infrastructure Law. The U.S. Army Corps will receive $14 billion for ports, waterway, and coastal investments.

Related articles

Semiconductor Industry Requires 2023 Retooling

Semiconductor Industry Requires 2023 Retooling

January 28, 2023
Learn the blockchain this year and dive into a new frontier

Learn the blockchain this year and dive into a new frontier

January 27, 2023

Picturing modern port operations

Here’s some of what’s possible with modern port networks:

  • Faster vessel loading and unloading. Load straddle carriers, terminal tractors, reach stackers, cranes, and other handling vehicles with OCR scanners, HD cameras, and navigation systems—all connected to the terminal operations system (TOS) to give drivers real-time instructions.
  • Safer working conditions with automated guided vehicles (AGV) or tele-remote operation of container-handling equipment.
  • Improved equipment uptime, achieved by transmitting and analyzing real-time vehicle telemetry to predictive maintenance applications.

It takes an ultra-reliable wireless network

The networks supporting modern port operations need very high reliability and low latency. Wi-Fi is perfect to connect in-vehicle devices. But it wasn’t designed to connect moving vehicles to real-time applications—much less in large areas with tall container stacks. I’ve been working with a port authority whose Wi-Fi coverage was so spotty that rubber-tired gantry (RTG) operators drove to the non-operational areas after each assignment to pick up instructions for the next. Meanwhile, containers stayed still—and so did ships. Since that operator deployed Cisco Ultra-Reliable Wireless Backhaul, vehicles are always connected to the TOS so that drivers can see the next task from wherever they are. Productivity has skyrocketed.

Consider cybersecurity from the start

With better connectivity comes more opportunities… and more cyber threats. A reminder came in late February 2022, when a ransomware attack disrupted one of India’s largest container terminals, forcing it to divert vessels to other terminals. Just a few months earlier, suspected foreign government-backed hackers breached a computer network at the Port of Houston. Fortunately, early detection prevented the intruders to disrupt shipping operations.

Like traditional enterprise networks, port networks need effective perimeter security based on firewalls and malware detection, but don’t buy into the myth that perimeter security is enough! Ports and terminals are open environments, involving numerous contractors and some outdated technologies. To put the right defenses in place—such as patching vulnerable software and segmenting the network to prevent attacks from spreading to disrupt the entire operation—you need to first identify every connected asset. You also need to monitor industrial communications to detect abnormal behaviors and raise alerts before it’s too late.

This is exactly what Cisco Cyber Vision is designed to do. Built right into the industrial switches installed in cranes and vehicle, it automatically takes a precise inventory to show everything connected to your network. You can see right away, for example, if a contractor has connected an unauthorized wireless access point that could give an attacker a foothold. Cyber Vision also calculates a risk score for each asset so that you know what to fix to reduce the attack surface and keep cargo moving. This visibility is shared with your IT security tools so that you can create and enforce policies restricting which assets can talk to each other. (Not a quayside camera and a database, for instance.)

Come see our port security solution in action at “Hack the Port 22,” March 21-25, 2022

We’ll be demonstrating how to use Cyber Vision to secure port operations at Hack the Port 22, a cybersecurity event put on by Maryland Innovation and Security Institute (MISI) and DreamPort, inspired by U.S. Cyber Command. This year’s event will be held virtually and in person at the Greater Ft. Lauderdale Convention Center. I invite you to tune into my presentation on Monday, March 21, Wireless at a Port, is it Magic, Science, or a Mystery? If you attend in person, please introduce yourself!

Learn more

Share:



Source link

Tags: chainefficiencyOperationsportSecuringStartssupply
Share80Tweet50

Related Posts

Semiconductor Industry Requires 2023 Retooling

Semiconductor Industry Requires 2023 Retooling

January 28, 2023
0

Image: Gorodenkoff/Adobe Stock The combined market cap of the top 10 global chip companies is down 34% from $2.9 trillion...

Learn the blockchain this year and dive into a new frontier

Learn the blockchain this year and dive into a new frontier

January 27, 2023
0

On sale for just $25, The 2023 Blockchain Development Fundamentals Bundle offers courses to help you understand the essentials of...

Matter interoperability tops Amazon’s CES 2023 IoT announcements

Matter interoperability tops Amazon’s CES 2023 IoT announcements

January 9, 2023
0

Car voice assistance, navigation and the Matter standard top Amazon’s CES 2023 announcements. Plus, how far are we into the...

MORAI shows off autonomous driving simulation technologies at CES

MORAI shows off autonomous driving simulation technologies at CES

January 5, 2023
0

The South Korean company aims to verify the safety of systems for self-driving cars, unmanned robots and urban air mobility,...

Iris Technology releases beta version of webAI, new no-code AI platform

Iris Technology releases beta version of webAI, new no-code AI platform

January 5, 2023
0

Image: Kaikoro/Adobe Stock Iris Technology has released a new no-code solution that allows developers and enterprises to train and deploy...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved