Follow

according to Cybeats: Install a software agent, written in C, running as root, on every critical embedded Linux device in power plants, water processing plants, railway control systems and other critical infrastructure, and have said agent connect to the public cloud (AWS, in fact) to allow for security monitoring and remote firmware updates.

What could *possibly* go wrong?
cybeats.com/

@ayo

What are you proposing? Zero monitoring and updating?

@holsta Something that works in an airgapped, heavily firewalled and monitored management-only network. Any form of internet access is a liability in such networks. Not to mention that suppliers are typically the weakest link in the security of critical infrastructure, you don't want to have a supplier with such direct and unauditable access to your systems.

Sign in to participate in the conversation
niu.moe

Welcome to your niu world ! We are a cute and loving international community O(≧▽≦)O !