OPSWAT Blog

What Can Other Critical Infrastructure Operators Learn from Nuclear?

Posted by Tony Berning / March 4, 2015

Cyber threats have received a lot of attention lately (e.g. Target, Sony, etc.), and the general public is becoming more aware of the damage that can be inflicted by attacks targeted at digitally vulnerable systems. Although alarming to some, news of this threat isn’t new for operators of critical infrastructure, who have been protecting themselves against this type of attack for years. Even though general safeguards have been put in place, there is a lot of variation between different critical infrastructure organizations in how well they have prepared for the looming threat of cyber-attacks.

read more

Tony manages the Metascan and Metadefender product lines at OPSWAT, working with customers and partners to deliver products that meet customers’ multi-scanning and security needs.

Tags: nuclear IT Infrastructure energy


Webinar: Top Five Cyber Security Challenges for the Energy Industry in 2015

March 2, 2015

The energy sector is set to face five of the biggest challenges in cyber security this year. With high costs at stake these companies are vulnerable to security threats, like critical infrastructure attacks, data destruction, breaches, insider threats and much more. It is time for the energy sector to proactively address these threats that are targeting their most valuable assets before it is too late. 

read more

Tags: cybercrime webinar Kaspersky Lab cybersecurity energy


Hawaii State Digital Archives Uses Metascan to Secure State Records

February 28, 2015

In 2010, the Hawaii State Archives introduced the Digital Archives Project, an agency whose primary goal is to collect and permanently store state government records that would possess historical, legal and fiscal value. Protecting each record from loss, alteration, deterioration and technological obsolescence while maintaining them in a trustworthy state is their primary responsibility. The Hawaii State Digital Archives needed a solution that could provide them with a high assurance that files submitted were free from malware and that it could identify and analyze the mass amount of file types being transferred. 

read more

Tags: Metascan Multi-scanning Hawaii State Digital Archives


Potentially Unwanted Application Behaves Like Malware, Eludes Detection

Posted by Adam Winn / February 26, 2015

I think this development was inevitable, but that doesn't make it any less disturbing. Potentially unwanted applications (PUAs) are now borrowing techniques from malware developers.

read more

Adam is the product manager for the GEARS platform, and also works on a cloud Wi-Fi management system. His primary goal is to ensure OPSWAT products are meeting the manageability and security needs of its current and future customers. He is an avid researcher and enjoys solving technical challenges. 

Tags: AppRemover Assessing Device Risk IT Infrastructure GEARS PUA


February Monthly Updates

February 26, 2015

February was a big month for OPSWAT. Read on for tips on avoiding data breaches, dates for our upcoming webinars and a summary of our product updates this month.

If you want to sign-up to receive our monthly newsletters, please visit our preferences page. You can also interact with us on social media by following us on Twitter: @OPSWAT or by visiting our LinkedIn company page!

read more

Tags: Multi-scanning Assessing Device Risk IT Infrastructure Monthly Updates


7 Tips for Helping a New Team Member Succeed

Posted by Victor Reynolds / February 25, 2015

Integrating a new member is something every team has to go through every now and then, so I figured that we could all use a little refresher on making the “newbie" feel welcome and setting them up for success. You might not have been a new hire for quite some time, so here are a few suggestions to help create a smooth transition for both you and your new team member.

read more

 Victor Reynolds is a software engineer on the Metascan ground team. He is originally from the gaming industry, and now uses his experience to make Metascan a world-class product. As former basketball player and a current coach, Victor helps motivate and inspire his colleagues to achieve their full potential. When he is not programming, you can find him turbocharging a vehicle, building electrical components, or playing videogames.

Tags: IT Infrastructure Best Practices team building


Edvation Uses Metascan to Secure their E-Learning Platform

February 24, 2015

Edvation is an e-learning company that focuses on improving ways students learn. They provide a virtual classroom setting so that teachers and students have the ability to communicate easily, while sharing projects, educational documents and course-related articles. With files constantly being uploaded and downloaded by students and teachers, Edvation became concerned that there was a chance of a malicious file being uploaded to their system. The goal was to find a cost-effective solution that could help them maintain a secure platform for all users.

read more

Tags: Metascan Multi-scanning Edvation


How Was Malware Introduced to an Air Gapped Network?

Posted by Adam Winn / February 23, 2015

"External network links are the lifeblood of most malware," said information security journalist Darren Pauli, in a recent article featured on The Register. In this article, Darren discusses a clever piece of malware that was sent to researchers at FireEye for investigation after it was found on an air gapped network.

read more

Adam is the product manager for the GEARS platform, and also works on a cloud Wi-Fi management system. His primary goal is to ensure OPSWAT products are meeting the manageability and security needs of its current and future customers. He is an avid researcher and enjoys solving technical challenges. 

Tags: Multi-scanning nuclear Assessing Device Risk IT Infrastructure air gapped network SCADA


What’s the Best Amazon Web Services Region for Serving China?

Posted by Adam Winn / February 20, 2015

If you pay attention to Amazon Web Services (AWS), you may have seen an announcement about a year ago that hosting would soon be available in China (Beijing). And if you’ve looked into it, you no doubt noticed that it’s not truly part of AWS – it’s actually a separate company (a joint venture) and requires a separate account. While many of the services are the same, they lack much of the seamless integration with the broader AWS ecosphere.

read more

Adam is the product manager for the GEARS platform, and also works on a cloud Wi-Fi management system. His primary goal is to ensure OPSWAT products are meeting the manageability and security needs of its current and future customers. He is an avid researcher and enjoys solving technical challenges. 

Tags: IT Infrastructure AWS


GEARS ‘Iowa’ Released

Posted by Adam Winn / February 19, 2015

Another month and another GEARS release with exciting new features. 

  1. Survey feature enhancements
  2. Configurable length of AV & backup policies
  3. Status tray icon color changing
  4. PLIST and txt file with critical status
  5. Reorganized left navigation entries

In case you missed last month’s release notes, GEARS now publicizes our release code names. Last month was Minnesota; this month is Iowa. Interesting fact: Iowa is the only US state bordered by two navigable rivers.

read more

Adam is the product manager for the GEARS platform, and also works on a cloud Wi-Fi management system. His primary goal is to ensure OPSWAT products are meeting the manageability and security needs of its current and future customers. He is an avid researcher and enjoys solving technical challenges. 

Tags: Software Manageability Assessing Device Risk Endpoint Management New GEARS Features