基本HTML大乐透走势图500期图
Page 17 - CDM专属未来 - 网络安全白皮书与David G. Dewalt博士 - 2018
P. 17

once I was stumped.  He brought up the critical infrastructure issue right now that cyber
               criminals and cyber terrorists going on the offense have massive advantage by implanting
               capabilities into these networks using the art of cyber war and you could, heaven forbid,
               bring down US critical infrastructure.  These industrial networks are desperately in need
               of another “Fireeye” like solution and Dr. DeWalt is ‘on it’.  Stay tuned for more in this
               industry.          I        am          impressed           with         TemperedNetworks
               (see:http://www.temperednetworks.com/)                         ,               CryptoniteNxt
               (see://www.cryptonitenxt.com)              and        Owl         Cyber        Defense
               (see://www.owlcyberdefense.com/)  with  their  unique  approaches  to  helping
               solve this problem with ‘zero-trust’ and Dr. DeWalt says there will be more coming – with
               a potential multi-billion dollar valued company in this marketplace very soon.




















               Pictured above, one of the many high risk Industrial SCADA gas energy facilities


               The Internet of Things (IoT).  Many people call these devices ‘smart’ devices.  Both Dr.
               DeWalt and I are replacing the word ‘smart’ with ‘extremely vulnerable’ – there are way
               too many IoT devices connecting to IP networks vs industrial networks:  from your Nest
               or similar thermostats on your home or business wifi to smoke alarms, smart-locks, door-
               bells with cameras to so many more.  The consumerization of IoT home and office seems
               amazing and enabling yet, most of these devices are extremely vulnerable – it’s almost as
               if each vendor either rushed them to market with accidental vulnerabilities or some of
               them have purposeful built-in backdoors.




















                 Whitepaper Copyright © 2018, Cyber Defense Magazine and Dr. David G. DeWalt.  All rights reserved worldwide.            17
   12   13   14   15   16   17   18   19   20   21   22