Tag Archives: industrial

A paradigm shift for industrial security: immunizing factories.

Ten years is a long time in cybersecurity. If we could have seen a decade into the future in 2011 just how far cybersecurity technologies have come on by 2022 – I’m sure no one would have believed it. Including me! Paradigms, theories, practices, products (anti-virus – what’s that?:) – everything’s been transformed and progressed beyond recognition.

At the same time, no matter how far we’ve progressed – and despite the hollow promises of artificial intelligence miracles and assorted other quasi-cybersecurity hype – today we’re still faced with the same, classic problems we had 10 years ago in industrial cybersecurity:

How to protect data from non-friendly eyes and having unsanctioned changes made to it, all the while preserving the continuity of business processes?

Indeed, protecting confidentiality, integrity and accessibility still make up the daily toil of most all cybersecurity professionals.

No matter where it goes, ‘digital’ always takes with it the same few fundamental problems. ANd ‘go’ digital will – always – because the advantages of digitalization are so obvious. Even such seemingly conservative fields like industrial machine building, oil refining, transportation or energy have been heavily digitalized for years already. All well and good, but is it all secure?

With digital, the effectiveness of business grows in leaps and bounds. On the other hand, all that is digital can be – and is – hacked, and there are a great many examples of this in the industrial field. There’s a great temptation to fully embrace all things digital – to reap all its benefits; however, it needs to be done in a way that isn’t agonizingly painful (read – with business processes getting interrupted). And this is where our new(ish) special painkiller can help – our KISG 100 (Kaspersky IoT Secure Gateway).

This tiny box (RRP – a little over €1000) is installed between industrial equipment (further – ‘machinery’) and the server that receives various signals from this equipment. The data in these signals varies – on productivity, system failures, resource usage, levels of vibration, measurements of CO2/NOx emissions, and a whole load of others – and it’s all needed to get the overall picture of the production process and to be able to then take well-informed, reasoned business decisions.

As you can see, the box is small, but it sure is powerful too. One crucial functionality is that it only allows ‘permitted’ data to be transferred. It also allows data transmission strictly in just one direction. Thus, KISG 100 can intercept a whole hodge-podge of attacks: man-in-the-middle, man-in-the-cloud, DDoS attacks, and many more of the internet-based threats that just keep on coming at us in these ‘roaring’ digital times.

Read on…

What’s the story – morning glory?!

There’s an extraordinary, rather rare, optical phenomenon that goes by the name of a glory, called so no doubt because of its resemblance to a halo. It’s caused by the shadow of an airplane (or some other object) on some clouds, which shadow becomes encircled by rainbow-esque rings – almost like a rainbow that’s perfectly round (which, actually, does occur, but only in very rare circumstances), but this isn’t a full-circle rainbow, it’s a glory. Confused yet?!

Curiously, the airplane’s shadow in the middle can disappear, leaving just the glory. You can get to see such an effect from a plane (if you’re lucky) coming in to land in cloudy weather if you sit at a window that’s not facing the sun. Which is where we were sitting; and this glory showed itself upon the dense cloud cover below us. I hadn’t seen this mysterious optical phenomenon at such a height for ages. This one was probably due to the air being relatively clean and fresh =>

Read on…

Flickr photostream

  • Turkey, Istanbul
  • Turkey, Istanbul
  • Turkey, Istanbul
  • Turkey, Istanbul

Instagram photostream

Fully-vaxxed Sochi conference: a shot in the arm for industrial cybersecurity.

Personal experience, plus what I’m told by other clever folks, has taught me to treat with much skepticism any predictions regarding the future given by so-called experts – in fact all kinds of prognoses and prophesies about this, that and the other. Although I tend to share this view, I have to make an exception for the predictions of one single person in particular: me! Why? Because, unfortunately, those predictions normally come true…

Ten years ago, when we chose industrial cybersecurity as one of our new main areas for development of the company, attacks on industrial equipment were largely deemed hype and/or something out of Hollywood, or at least limited to relatively few specific enterprises; for example, ones like this. But since the beginning of the 2010s I’ve been repeating (ad nauseam!) that, sooner or later, attacks on industrial installations will go mainstream and become massive in scale, and that modern industrial security is sadly very lacking in its ability to cope with the realities of the digital world.

Today, attacks on industrial objects are becoming a daily – very expensive – reality. We’ve already seen how a ransomware-cyberattack on a mere office network of large pipeline can bring about a short-term rise in the price of gasoline in the U.S.A. So imagine how much more costly attacks on industrial components of critical infrastructure operators could be. And it’s not just a matter of financial losses incurred by targeted companies caused by their compelled down time – there’s also the hit taken by all the consumers of the companies’ products and services, which can be painful for regional economies and even national ones.

Read on…

Enter your email address to subscribe to this blog

Maslow’s hierarchy of needs for hackers in today’s geopolitical cyberspace.

One morning last week I bounded up onto a stage to make a speech, and the first thing I told everyone was literally: “How happy I am to see you all here!” But of course I was, since I – like most everyone else – am just soooo tired of this long-drawn-out corona-covid saga. I want a return to normality and to be able to get back to my customary rhythm of conferences, exhibitions, and assorted other business activities (preferably without a tie). And as if my prayers were answered – here was one such event, which happened to be one of our own: our annual Kaspersky Security Day 2021

So what can I say?… That folks clearly missed such kind of meets. Who was there? Everyone! Just short of 200 guests in person, and more than 500 followed the live broadcast online.

Read on…

There are museums above the Arctic Circle too: who knew?!

Still up above the Arctic Circle, after our excursion of the phostpates mine, it was back to the town of Kirovsk. It’s not only a mining center, it’s a skiing one too. I really hoped we could get a half-day of downhill skiing in, but it wasn’t to be; as often is the case – ‘we’ll have to do that next time’. The ‘cultural program’ this time was somewhat more modest: a visit to the town’s museum! It’s rather small, but all the same there’s plenty to see.

In room 5 there’s a collection of mineral stones – around a thousand of them! Wonderful! It reminded me of my once uttering ‘Mom, I want to be a geologist!’

Oh my geology! So many! All different somehow – in terms of chemical make-up, color, shape. Odd names too – many I’d never heard of:

Read on…

Remote working – even miners do it.

Hi folks!

I’d heard a lot about modern mining equipment that works autonomously, i.e., without a miner nearby controlling it. Well now I’ve seen it in action too – the other day, when I paid a visit to Phosagro in the Khibiny Mountains on the Kola Peninsula – inside the Arctic Circle! – in the northwest corner of Russia, not far from the Finnish border.

Here’s a robo-miner drilling into rock, all on its lonesome:

Whereas today’s ‘miners’ sit in a brightly-lit, air-conditioned office operating joysticks occasionally and checking the progress of the robots on a bank of screens:

Read on…

The gateway to cyber-immunity.

Hi folks!

Herewith – a brief interlude to my ongoing meandering Tales from the Permafrost Side. And what better interlude could there be than an update on a momentous new K-product launch?!

Drum roll, cymbal!…

We’re launching and officially presenting to the world our first fully ‘cyber-immune’ solution for processing industrial data – the death knell for traditional cybersecurity heralding in a new era of ‘cyber immunity’ – at least (for now) for industrial systems and the Internet of Things (IoT)!

So, where is this cyber-immune solution? Actually – in my pocket! ->

Read on…

MLAD – Keeping factories running using machine learning for anomaly detection.

Phew. Thank goodness it’s over. The ghastliest year known to most of us ever – finally done, dusted, finito, fertig. Let’s just hope, as many folks are repeating: ‘2021 will be better; it can’t be worse, surely?!’

For a good 10 months of last year practically the whole world was in a permanent state of shock. And I don’t just mean the world’s population; private business and national economies were also hit incredibly hard. Alas, one field that hasn’t been affected badly at all – in fact it has only benefitted from the pandemic, greatly – is cybercrime. Folks locked down and working from home and spending much more time online meant there were many more potential cybercrime victims ripe for the hacking. And not just individual users, but also companies: with employees working from home, many corporate networks came under attack as they weren’t sufficiently protected since, in the rush to get everyone working remotely quickly in the spring, security wasn’t given priority. In short, the whole world’s digital status quo was also badly shaken up by this vicious virus from hell.

As a result of the rise in cybercrime – in particular that targeting vulnerable corporate networks – the cybersecurity sector has been busier than ever. Yes – that includes us! 2020 for us as a Kompany turned out to be most productive. For example, the number of new versions of our solutions launched throughout the year was most impressive – especially in the enterprise sector.

We’ve also had new versions in our industrial cybersecurity solutions line up, one of which is what I want to talk about today – some teKh known as MLAD. Not to be confused with online funny-video sites, or MLAD that’s short for Minimum Local Analgesic Dose, or MLAD that’s short for Mid Left Anterior Descending artery, our MLAD is short for Machine Learning for Anomaly Detection.

If you’re a regular reader of our blogs, you may recall something about this tech of ours. Maybe not. Anyway – here’s a refresher/into, just in case…

Our MLAD is a system that uses machine learning to analyze telemetry data from industrial installations to pinpoint anomalies, attacks or breakdowns.

Let’s say you have a factory with thousands of sensors installed throughout – some measuring pressure, some temperature, others – whatever else. Each sensor generates a constant flow of information. An employee keeping track of all those flows is fairly impossible, but for machine learning – it’s a walk in the park. Having preliminarily trained up a neuro network, MLAD can, based on direct or indirect correlations, detect that something’s wrong in a certain section of the factory. In doing so, million or multimillion-dollar damages caused by potential incidents not nipped in the bud can be avoided.

Ok – that’s the overall idea of what MLAD does. Let me now try and relate the granular scale of the analysis MLAD accomplishes using a medical metaphor…
Read on: MLAD

Online conference – Chinese style (complete with pioneering-tech superstition).

Normally, my work schedule is made up of all sorts of meetings, press interviews, taking part in exhibitions, speaking at conferences all over the globe. Normally. Not this year, darn it!

Now, some of the events I get to are one-offs. Some are regular, recurring ones (mostly annual) but to which I get only once in a while. While there are some recurring events that I deem simply must-attend. And one of my main must-attends every fall or early winter is the World Internet Conference in Wuzhen, organized by the Cyberspace Administration of China, which I’ve participated in every year (up to 2019, that is) since 2015 – just a year after it’s ‘inauguration’ a year earlier. This year, alas – no traditional trip to eastern China; however, much like here at K, not being able to be present in-person does not mean a big and important event can’t still go on. Which is great news, as this means I can still get what I want to say across to: the main players of the Chinese internet – state regulators, heads of provinces and regional development institutes, and also bosses of the Chinese big tech companies; and all from a huge screen – perhaps the biggest I’ve ever seen!

Sure, it would have been nice to be there in person – to stroll around the quaint cobbled narrow streets of the old ancient town (as old as the Tang dynasty, apparently) and take a boat ride along its canals, which indeed some folks did manage to do, somehow. But I was playing it safe. Still, the plentiful ‘in-person’ activity at the venue is at least cause for optimism during these remote-everything times.

But now for the main thing: about Wuzhen superstition…

Read on…