Evan Birkhead

Recent Posts

The Paradox of the Industrial Internet

February 15, 2017


5 Take-Aways from EMA’s new Industrial IoT Research

As reported by Reuters last year, Marty Edwards, who runs the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (known as ICS-CERT), warned that his organization observed a significant year-over-year increase in attacks targeting industrial control systems. Edwards said ICS systems are vulnerable because they are exposed to the Internet.

Read More

Breaking Down the IDC Top 10 IoT Predictions for 2017

January 24, 2017


A new IDC FutureScape offers top 10 predictions for the Worldwide IoT in 2017.  The research evaluates 10 emerging trends and ranks them in terms of their likely impact across the enterprise and the time it will take each prediction to go mainstream (meaning the middle of bellcurve of adoption). 

We took a close look and found that the list provides an excellent starting point for enterprises – particular industrials - that are steadily getting pulled toward the Industrial Internet and need to learn more.  Let’s break it down.

Read More

Protecting Industrial Control Systems from Cyber Attack

December 06, 2016

A discussion on ICS and IoT cyber protection between Ed Amoroso, Founder & CEO of TAG Cyber, and Francis Cianfrocca, Founder & Chief Scientist, Bayshore Networks.  Originally posted on LinkedIn.

Read More

How Industrial IoT Startups Will Disrupt the Incumbents

November 02, 2016

by Maarten Ectors
VP, IoT at Canonical/Ubuntu

Read More

Alice and Bob... in Some Strange Land

September 09, 2016

Posted by Dr. Edward G. Amoroso
Former SVP and CSO of AT&T
Current CEO of TAG Cyber, LLC
Hoboken, NJ

Read More

Launching the Effort to Make Sure the IIoT Offers More Opportunity for Cyber Security than Cyber Crime

September 09, 2016

by Evan Birkhead
VP Marketing, Bayshore Networks

IIC blog - Launching the Effort
IIC white paper - The Business Viewpoint of Securing the Industrial Internet
IIC security framework - The Industrial Internet Reference Architecture

Part of the Industrial Internet Consortium’s (IIC’s) mission is to bring together different viewpoints to share information and find common ground for progress. Frankly, we haven’t encountered a topic more polarizing than cybersecurity. But we believe that understanding the different business and technical drivers behind OT and IT are essential to creating a best practices security framework that will benefit industrial enterprises. 

Read More

Bayshore Networks® Defends Against ICS/SCADA Malware

August 03, 2016

Bayshore’s IT/OT Gateway converts threat intel research into security policy that helps defend against headline-making attacks such as Black Energy, IronGate, and StuxNet

LAS VEGAS, BLACK HAT, AUGUST 3, 2016 – Bayshore Networks®, Inc., a provider of technology that safely and securely enables the Industrial Internet, today announced that its Bayshore IT/OT Gateway™ has the capability to help protect industrial enterprises against headline-making malware attacks such as BlackEnergy, IronGate, and StuxNet, among others.

“Bayshore provides two specific advantages in detecting ICS/SCADA malware - logic-rich policy-based security and extremely deep inspection of industrial application traffic, including embedded content,” explained Andres Andreu, Bayshore Networks VP, Engineering. “Once our IT/OT Gateway knows the pattern of any attack, we can deliver protection against that to our customers as policy. Then our deep content inspection capabilities enable us to detect malware moving across a network.”

Bayshore’s policy-based approach distinguishes it from the white listing approach used by IT security solutions such as IDS and firewalls. Bayshore builds security policy from multiple sources, including internal research, customer (proprietary) created rules, and external trusted sources including ICS-CERT, OWASP, Stix/Taxii, and leading defense threat intel vendors and service providers.

“On-premises security devices which work well on the IT side are not cost-effective and don’t provide policy management down to the data level necessary in OT environments, “ said Christina Richmond, Program Director, Security Services, at IDC. “These devices can protect the PLCs (Programmable Logic Controllers), but do not provide insight or management down to the robots, conveyors, and power-generation equipment level.”(1)

Bayshore’s cloud-based software, called the Bayshore IT/OT Gateway, provides IT departments with visibility into OT infrastructure, networks, applications, machines and operational processes. OT networks are undergoing transformation and require services traditionally available only for IT networks, such as secure remote access, malware protection and analytics. Bayshore delivers immediate value by preventing OT process disruptions and enhancing operational efficiency and business continuity.

Andreu cautioned that there is no silver-bullet security solution and that close collaboration between OT operations managers and IT security executives is critical to addressing emerging cyber security threats on industrial networks. He encouraged industrial enterprise and OT security directors to implement security best practices across their infrastructure and throughout their organizations and to work in conjunction with trusted entities to address immediate vulnerabilities.

Read More

Categories