PFP Cybersecurity (@pfpcyber) 's Twitter Profile
PFP Cybersecurity

@pfpcyber

Dynamic power behavior analytics enables Integrity-Assessment-as-a-Service for IoT, data centers, routers, SCADA and more.

ID: 1679104776

linkhttps://pfpcyber.com calendar_today17-08-2013 20:59:24

446 Tweet

526 Followers

450 Following

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

Cyber-Supply Chain Risk Management | Acquisition.GOV 504.7002 Policy, item C – OMB Circular A-130, “Managing Information as a Strategic Resource,” directs agencies to implement supply chain risk management principles to pro…lnkd.in/gh7HdU_w lnkd.in/gNs2kQaa

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

Vendors and users have seen this for years but there was no written requirement. The new GSA Subpart 504.70 - Cyber-Supply Chain Risk Management requirement, effective 4/1/2022, with penalties such as termination should bring atten…lnkd.in/e2_M39QV lnkd.in/eWBWP9iq

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

The PFP Cybersecurity SigLytics platform can detect counterfeit chips, devices with counterfeit chips inside, devices tampered in hardware and firmware. It is designed for non-technical frontline operators to check devices in hand…lnkd.in/ePwXVivv lnkd.in/e6hHJ5uB

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

We are proud supporters of Dr. Aziza Shad and sponsors of The Aslan Project Inc., a Washington, DC nonprofit that addresses inequalities in global pediatric cancer care through a multi-disciplinary approach focusing on education an…lnkd.in/eDBsprfX lnkd.in/ePjpKy5Y

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

“The active exploitation of some of the discovered vulnerabilities can’t be detected by firmware integrity monitoring systems due to limitations of the Trusted Platform Module (TPM) measurement. The remote device health attestation…lnkd.in/g5pEKGs6 lnkd.in/gNFkMWPd

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

PFP Cybersecurity's SigLytics analytics platform protects chips, boards, devices and systems. It is scalable, flexible, portable and affordable. lnkd.in/geFuky73

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

The SigLytics (TM) analytics platform from PFP Cybersecurity detects changes in hardware bill of materials (#HBOM) and software bill of materials (#SBOM) from chips, boards, devices and system. Thanks to Igor Gonebnyy for pointing out the naming error about…lnkd.in/gYFSW5fi

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

How do ensure there is no unallowed chips such as memory and IP camera chips, in your products? PFP Cybersecurity SigLytics can do it on benchtop, I. Manufacturing and by end users. lnkd.in/gg5k-YQy

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

Commissioner Simington Calls For Mandatory Security Updates For Wireless Devices. "It is true that vulnerabilities in device software can give rise to data theft and other application-level incidents that are usually thought of a…lnkd.in/g5pBDKJm lnkd.in/gvpZBZx6

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

While awareness is due for Chinese made CCTV camera, buyers should pay attention to Chinese camera chips inside CCTV camera made by all vendors. "Chips from the HiSilicon unit of Huawei are sparking concern because they power millions of surveillance cam…lnkd.in/gRk_hj3D

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

PFP Cybersecurity detects firmware attacks with air gapped monitoring, for level 1 and level 0 devices, in machine time. ————— Red Balloon Security, Inc. have disclosed multiple architectural vulnerabilities in Siemens SIMATIC and…lnkd.in/gVwnHgmK lnkd.in/gKaJM6tA

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

It is a good question for board meetings about how ChatGPT will impact their business. One thing for sure is that I expect to be surprised again and again. lnkd.in/gU6kBpqN

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

This is an excellent example that a dual use technology is showing impact outside of defense applications. There many more to come towards commercial and consumer applications. Congrats to N5 Sensors, Inc. and the N5 Sensors, Inc. Team. Blu Ventures dua…lnkd.in/gRBwbXDv

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

Beside public charging stations, be careful with USB cable. I have been showing an USB cable with its connector opened to show a small circuit board with a controller chip. There are stories that adversaries use USB cable as tools. lnkd.in/eGsu-93t

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

GSA and American Council for Technology - Industry Advisory Council (ACT-IAC) event on Cyber-Supply Chian Risk Management. Please see the PFP Cybersecurity handout file in comment. lnkd.in/dEHp2gWc #supplychainsecurity #DFARS #FAR #zerotrust lnkd.in/dv-P6r8V

PFP Cybersecurity (@pfpcyber) 's Twitter Profile Photo

Joint NSA & CISA Cybersecurity Info Sheet Urges Fortification of Baseboard Management Controllers Overlooked firmware! Indeed. When users buy commercial or commercial on the shelf (COTS) products, there are standard features such as BMC. Adversaries kno…lnkd.in/gEqCsMuC