Profile cover photo
Profile photo
Eric Byres
123 followers -
Recognized as one of the world's leading experts in the field of SCADA security, and with a background as a process controls engineer, Eric Byres brings a unique combination of deep technical knowledge plus practical field experience to his role as CTO and VP Engineering for Tofino Security at Belden Inc.
Recognized as one of the world's leading experts in the field of SCADA security, and with a background as a process controls engineer, Eric Byres brings a unique combination of deep technical knowledge plus practical field experience to his role as CTO and VP Engineering for Tofino Security at Belden Inc.

123 followers
About
Posts

Post has attachment
Curious about the Tofino Security story, what was our biggest challenges and darkest times, and where Joann and I are heading next? Then check out my interview with Dale Peterson of DigitalBond at http://wp.me/p4wrt-3DE
Add a comment...

Post has attachment
Today Joann and I are publishing our last blog at Tofino Security. At the end of January, we will be stepping away from ICS security, firewalls and endless airport security checks. Our plans include lots of fun and a few surprises
Add a comment...

Post has attachment
Excellent 3rd party summary on the next generation of Tofino Security ICS/SCADA products
Add a comment...

Post has attachment

Post has attachment
This is a very impressive product - nice, secure remote desktop tool
Add a comment...

Post has attachment
If the International Space Station, with all its safety and security protocols, has been subject to infection via USB devices, that should clearly illustrate that no manufacturing facility could be any more secure. - See more at: http://www.automationworld.com/stuxnet-lives#sthash.YdBP3svw.dpuf
Add a comment...

Post has attachment
If the International Space Station has been attacked by ‘virus epidemics’, then what this tells us is: a) The air (or space) gap defense is a joke and b) any critical system must have a BYOD policy and an information sanitization/exchange strategy. Just pretending there is no data flow in or out of the critical system is misguided.
Add a comment...

Post has attachment
Great article on a visionary for SCADA/ICS security, David Mattes - David is someone who really gets that ICS security isn't just IT security with a few motors added. http://www.geekwire.com/2013/david-mattes/
Add a comment...

Post has attachment
Great analysis of the impact of NSA Surveillance programs on the security of the internet - http://resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/

Unfortunately, new attack and malware technologies and capabilities have a way of migrating from government agencies to organized crime groups. In the  words of Ross Anderson: “Back when we wrote the report in 2009 we said that what Chinese spooks did in 2008, Russian crooks will do in 2010. Unfortunately we were too optimistic – the criminals had all the tools in under a year"  http://www.tofinosecurity.com/blog/stuxnet-staying-ahead-bad-guys
Add a comment...

Post has attachment
In a recent blog article on SCADA Security – Chicken, Egg, and Chicken Omelette with Salsa – Dale Peterson is squawking like a rooster. Nothing new, but this time his message is scrambled. Eric Byres responds. http://ow.ly/oIgr8
Add a comment...
Wait while more posts are being loaded