Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Improving Maritime Cybersecurity and Operational Resiliency

The World Economic Forum cites cyberattacks on critical infrastructure, including transportation, as the world’s fifth highest risk in 2020.1 At the same time, transportation and logistics organizations are rapidly evolving to improve their service levels and efficiency.

To accelerate their digital transformation, Intelligent Transportation Systems (ITS) are becoming more connected and complex, which unfortunately opens the door to new cyber risks. To ensure operational availability during this transition, deep visibility into ITS networks is required.

Let’s look at the challenges faced by the maritime sector, and how they can be eased with ITS cybersecurity best practices and use of the right technology.

 

 

Improving-Maritime-Cybersecurity-Operational-Resiliency-01-BLOG

Maritime cybersecurity and operational resiliency are challenged by increasing digitization and connectivity. Applying cybersecurity best practices and OT/IoT visibility and security technology eases the problem.

 

Maritime Asset Owners Can Reduce Risk with Improved Cybersecurity

The maritime industry transports 90% of the world’s trade.2 Like other industries, it’s becoming increasingly automated and remotely monitored. Shippers want to optimize voyages and track the operational status of things like:

  • Load condition of the vessel
  • Fuel consumption
  • Position and route
  • Machinery performance
  • System efficiencies

Rapid digitization is fueling the development of Maritime Autonomous Systems (MAS), where new generation ships can be remotely controlled from land.

On the other hand, the level of system visibility and cybersecurity maturity in this sector is relatively low. Many ships contain devices and even systems that are unknown to their operators. Crew are not typically trained to identify phishing emails or manage network access control.

While dramatic situations like a vessel capsizing3 due to hacking are not out of the realm of possibility, they are still unlikely. Crew constantly observe ship behavior and can often employ manual or safety systems to correct performance that is out of normal range.

Disruptive events that are more likely to occur include:

  • Employees or suppliers unintentionally causing cyber incidents that threaten operational reliability or are expensive to remediate
  • Cyber criminals disrupting a company’s shipping operations or altering documents to facilitate drug smuggling
  • Threat actors stopping ship-to-shore functions, such as crane operations, and stopping the flow of goods

Driven by the need to reduce risk, comply with international shipping standards,4 and meet insurer requirements, shipping companies are investing in cyber resiliency. An important capability lies in identifying maritime assets and tracking their communications. Networks should be monitored for vulnerabilities, threats, and unusual behavior that could indicate a cyberattack.

Fortunately, real-time OT/IoT visibility technology can be used to improve both operational availability and cyber resiliency, helping ensure the safety of transportation system as they transform.

 

 

Improving-Maritime-Cybersecurity-Operational-Resiliency-02-BLOG

The wide variety of controls and control systems on ships makes them challenging to monitor and secure. Nonetheless, ship owners are improving cybersecurity programs, in part because of international shipping standards.

 

Improving Network and Operational Visibility

The complex technology used within the maritime transportation environment makes consolidated OT/IoT visibility extremely difficult. It also expands the attack surface, increasing vulnerability to cyber threats.

To keep things running smoothly, security and operations teams need a simple way to inventory the wide variety of devices and systems used. The Nozomi Networks solution, for example, provides deep visibility across all control networks by automatically creating an accurate, centralized inventory of OT/IoT assets and keeping it up-to-date.

Our solution analyzes network traffic, using the data to build a live, interactive visualization of operational technology systems. An extensive amount of useful information is provided, including:

  • A macro view of the entire ITS environment, with the ability to filter by subnets and network segments
  • Detailed asset views that make it easy to drill down for deeper insight
  • The role of each node and the traffic between nodes
  • The protocols used to communicate between nodes and zones
  • Network traffic information such as throughput, protocols and open TCP connections
  • Detailed attributes of endpoints and connections
  • Automated alerts that bring hardware, software and device changes to your attention

In fact, the breadth and depth of information often provides insight into previously unknown devices, connections and activity.

 

 

 

1-Automatically-Track-Your-Assets-min

Within minutes of deployment, the Nozomi Networks Solution provides comprehensive visibility into operational networks and ITS/IoT assets. It helps teams efficiently identify and mitigate cybersecurity and reliability risks.

 

Deep Visibility into Transportation ITS Networks Builds Operational Resiliency

To stay on top of what’s happening on transportation system networks, OT/IoT visibility and threat detection is required. Security gaps related to people and processes can have a big impact on operational resiliency too. For example, the separation of IT and OT, combined with increasingly connected ITS control systems, can lead to blind spots and vulnerabilities. But with the right technology and a focus on best practices, transportation organizations can increase operational resiliency.

The Nozomi Networks solution is tailored to meet the unique requirements of transportation asset owners. Many of the world’s top transportation companies have chosen our innovative solution for OT and IoT visibility. It helps them accelerate digital transformation while reducing cyber risk. Find out how it can help you by downloading the document below or contacting us.

 

 

 

Related Content

 

 

 

 

Transportation-IB-v20-thumbnail

Source: securityboulevard