Foundries.io and Arduino Deliver Secure Embedded Linux IoT and Edge

I have been expecting to see Arduino applications pop up like mushrooms after a spring rain. It’s been more like the occasional gold finch gracing the backyard birdfeeder. But advancements do come. This partnership between Foundries.io and Arduino along with the explosion of interest in Edge could tip the scales.

LONDON, March 24, 2022 – Foundries.io, the leader in cloud native development and deployment solutions for secure IoT and Edge devices, today announced its partnership with Arduino to deliver secure, embedded Linux IoT and Edge solutions for the enterprise with the Arduino Pro Portenta X8 (just announced today).

Arduino is an open source electronics company that manufactures open hardware development boards used by millions of developers around the world. It will use FoundriesFactory in its enterprise product to help customers ease development and deployment, reduce costs and accelerate revenue associated with industrial IoT and Edge devices.

“A few years ago, with the legendary Yún, Arduino invented a new category of products by combining microcontrollers and microprocessors on a single hardware platform. Now, we are taking this experience to the next level by providing enterprises the same flexibility, with performance on steroids thanks to the Portenta X8 (4x Cortex®-A53, Cortex-M7 and 2x M4)”, said Fabio Violante, CEO at Arduino. “Today, the world is different: You cannot think about a Linux-based device without anticipating the challenges of securing and maintaining it over time. This requires expertise, commitment and attention to every detail related to security and maintenance. For this reason, we decided to partner with Foundries.io to simplify this approach by providing a ready-to-use solution that can help our customers build systems with confidence. By embedding a FoundriesFactory in the Arduino platform, customers can be sure to choose the best solution on the market.”

The IoT market will more than double in the next five years, and the market for Edge devices will nearly triple with accelerated growth expected in industrial IoT, Electric Vehicle (EV) infrastructure and robotics. Among the challenges to realizing this growth and innovation for businesses are the security of these devices and the expense associated with building and maintaining Linux to support them. FoundriesFactory addresses these challenges with a cloud-based DevOps service to build, test, deploy and maintain these devices. It includes a fit-for-purpose, customizable Linux microPlatform OS built using best industry practices for security and incremental Over The Air (OTA) updates. Developers can build with freedom and ease, while businesses lower costs and reduce time to revenue.

Foundries.io is in a unique position to advance Arduino’s vision for enabling enterprises to more easily deploy and maintain Linux-based products for IoT and Edge applications,” said George Grey, CEO at Foundries.io. “The combination of the Portenta X8 and the FoundriesFactory cloud solution will accelerate customer time to market, increase product security and enable rapid deployment and lifetime OTA management of customer devices and fleets, while giving freedom of choice for connectivity to public or private cloud services. From off-the-shelf to fully customized options, Arduino and FoundriesFactory are providing an industry leading solution for Linux-based IoT and Edge products.”

Users will be able to access a FoundriesFactory for the Portenta X8 hardware platform. This will enable users to immediately connect Arduino Portenta X8-based products to the cloud and start developing container-based applications, leveraging the device management and DevOps capabilities available with FoundriesFactory.

Bionics and Robotics Training For Youth

Festo branches into many interesting endeavors. I’ve visited the company’s headquarters, a few customers including an Audi plant in Hungary, and the Cincinnati, Ohio area training facility. This news touches on a hot topic crucial to manufacturing success–training and education. Festo Didactic develops training courses and conducts classes. Here are two pieces of news. One from Ohio regarding a pre-apprenticeship program in a couple of schools. The second from Wisconsin concerning an award.

Warren County and Clermont County Schools Kickoff Manufacturing Pre-Apprenticeship Program

Students from Kings High School and Goshen High School get on-the-job training in advanced manufacturing from Festo Didactic, made possible by funding from Easterseals and the State. A group of 14 high school seniors in southwestern Ohio have become the first beneficiaries of a workforce development grant to fund a newly formed pre-apprenticeship program focused on modern day manufacturing.

The grant was awarded to Easterseals, a Cincinnati-based nonprofit organization focused on improving workforce equity, inclusion and access. 

Kings High School in Warren County and Goshen High School in Clermont County are the first high schools in the state to participate in the pre-apprenticeship program in collaboration with Festo Didactic, a global leader in industrial and technical education.

“The Area 12 HUB (Butler, Clermont, Warren counties and Easterseals) partnered with Festo because they have an exceptional model for their manufacturing pre-apprenticeship program,” said Jessica Dean, Manager, Youth Services Community Operations at Easterseals Serving Greater Cincinnati. “In this program, there’s a strong commitment to help youth become successful. For students to have access to high quality STEM education and hands-on training like this, it opens up a world of possibilities.”

According to apprenticeship.gov, by definition, pre-apprenticeship is a program or set of strategies designed to prepare individuals to enter and succeed in a Registered Apprenticeship Program (RAP). Pre-apprenticeship programs help employers save time and money by providing pre-screened, ready-to-work employees who have been trained in the specific skills employers need. U.S. Department of Labor case studies have shown that pre-apprenticeship programs can attract more diverse candidates, including women and people of color, and increase employment of disabled workers.

Specifically, Festo’s pre-apprenticeship is designed to introduce students to modern day smart manufacturing. The program prioritizes hands-on, experiential learning that exposes students to the wonders of bionics and robotics in addition to beginner-level engineering concepts in pneumatics and mechatronics. Pre-apprentices receive a comprehensive learning experience in the classroom with textbook and hybrid learning, then head off to the lab to apply their knowledge hands-on with IoT hardware and software systems. Upon completion of the program, students will receive a certificate of completion.

Classes are held at Festo’s Regional Service Center (RSC), a 47-acre state-of-the-art logistics and manufacturing plant that provides automation technology serving all of North America. The plant opened in 2015 and is among the 15 largest employers in Mason.

The RSC also serves as the home base for Festo’s award-winning Mechatronics Apprenticeship Program (MAP2) which first launched at the Festo Learning Center in 2016. In 2020, MAP2 earned the Best in Ohio Business Award in the Workforce Development Program category.

KTEC to Honor Festo Didactic as the 2022 Distinguish Partner

Festo Didatic is scheduled to be presented with KTEC’s 2022 Distinguished Partner Award at the annual KTEC Gala on Saturday, March 26, for the company’s dedication to education and support of KTEC.

The mission of Kenosha School of Technology Enhanced Curriculum (KTEC) is to engage learners of all types in an innovative and continually evolving learning environment, to prepare students for success through academic excellence by the use of 21st Century Skills, strategic partnerships, and technology integration to prepare for a global society.

The company is an important part of innovation for KTEC students. Festo and the school are working together to integrate bionics and mechatronics into the school’s STEM learning program for 6th–8th grade students.

Festo is also an important part of the design team for KTEC High School, which is slated to open this September. Festo is facilitating the development of the Automation and Robotics career pathway.

Annual Threat Detection Report Reveals Top Threats and Techniques

Threats can come suddenly from anywhere. The day after Russia invaded Ukraine traffic from Russia to my website spiked. I have a rather steady, if low, number of page views regularly from that country. Not sure why the spike. But when I turned my site into part of my business rather than a hobby blog, I also signed up with a website defense company.

Cybersecurity news has become a mainstay thread for the past year. I don’t know if the cause is related to the pandemic or if venture money is flowing that direction. They all do studies and reports. This one comes from a company called Red Canary, a managed detection and response provider. It analyzed 30,000 threats in customer environments and uncovered a number of trends, threats, and techniques from the 2021 landscape.

Red Canary, the Managed Detection and Response (MDR) provider that detects threats no one else does, on March 22 launched its fourth annual Threat Detection Report, an extensive report that’s based on analysis of more than 30,000 confirmed threats detected across customers’ environments in the past year.

The findings reveal that ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their earnings. The report explores the top 10 threats impacting the majority of Red Canary customers – from adversary favorites like Cobalt Strike to new activity clusters like Rose Flamingo – and the most common techniques that adversaries use to carry out these attacks, including guidance for companies to strengthen their ability to detect these threats.

“These threats are less sensational than you might find elsewhere, but they’re the ones that will impact the majority of organizations,” said Keith McCammon at Red Canary. “This report addresses highly prevalent threats and the tried-and-true techniques that are wreaking havoc on organizations. We take it a step further to explore in depth the adversarial techniques that continue to evade preventative controls, and that can be challenging to detect. We hope that this report serves as a valuable tool for everyone from executives to practitioners, providing the information that’s needed to detect and respond to cybersecurity threats before they negatively impact organizations.”

Red Canary found that adversaries have continued to carry out attacks using legitimate tools. As security tools increase in sophistication, adversaries are finding it more difficult to develop and deploy their own malware that evades defenses. As a result, adversaries rely on administrative tools — like remote management software — and native operating system utilities out of necessity, co-opting tools that are guaranteed or likely to be installed on a device rather than introducing non-native software.

Several of the top 10 threats and techniques highlighted in the report are used by adversaries and administrators or security teams alike, including command and control (C2) tool Cobalt Strike, testing tool Impacket, and open source tool Bloodhound. Cobalt Strike, in particular, has never been more popular, impacting 8% of Red Canary’s customers in 2021. Some of the most notorious ransomware operators, including Conti, Ryuk and REvil, are known to rely heavily on Cobalt Strike. Coming in at the No. 5 ranking, Impacket is a collection of Python libraries that is used legitimately for testing but is abused by ransomware operators. This is another favorite among adversaries, as it’s known to evade detection due to its difficulty to be differentiated as malicious or benign.

Ransomware was top billing for some of last year’s most destructive cyberattacks. The report describes the new tactics that ransomware groups used in 2021, such as double extortion, which applies pressure to victims in more than one way to coerce them to pay a ransom. Last year also brought the rise of the affiliate model, which made tracking malicious activity more difficult because intrusions can often result from an array of different affiliates providing access to different ransomware groups. Examples of this include the Bazar and Qbot trojans, used by adversaries to gain initial access into environments before passing off access to ransomware or other threat groups.

The report analyzes several new ransomware families that became more prevalent in 2021, including BlackByte, Grief, Hive, Yanluowang, Vice Society and CryptoLocker/Phoenix Locker, while also taking a look at the families that tapered off, like Egregor, REvil, BlackMatter and Doppelpaymer. Many of the emergent ransomware families were similar to those that became less or inactive, leading analysts to assess that known adversaries resurfaced using a new name.  

The threat landscape moved toward a Software-as-a-Service (SaaS) economy in 2021, muddying the already murky waters of attribution. While Ransomware-as-a-Service (RaaS) has been widely reported for years, this model has now become the norm for adversaries. While Red Canary has been tracking some “as-a-service” models like TA551 over the years, others are just now coming into focus. In particular, Red Canary tracks multiple phishing affiliates that dropped variants of the Bazar family of malware.

This economic model lowers the technical barrier to entry, allowing operators to purchase capabilities rather than develop them. Between Phishing-as-a-Service, Access-as-a-Service, and Crypters-as-a-Service, it has never been easier to find an adversary for hire.

Download Red Canary’s full Threat Detection Report here.

HPE Expands GreenLake Edge-to-Cloud Platform Adding Services

Hewlett Packard Enterprise executives discussed the company’s latest product and business advances this morning, March 22, 2022. Antonio Neri, President and CEO, added that the “as-a-Service” business continues to be accepted by customers with revenue growth above 130% last quarter.

Technology continues to blend for manufacturing and production enterprises as Edge-to-Cloud architectures mature.  HPE moved aggressively to an as-a-Service business model. This announcement concerns adding Aruba networking customers to the GreenLake platform—120,000 in total—adding a new extension of Networking-as-a-Service. GreenLake also added 12 new cloud services and HPE expanded its online marketplace by adding ALSO Group, Arrow Electronics, Ingram Micro Inc., and TD Synnex.

HPE appears to be outpacing rivals with networking, compute, and data services available with the as-a-service flexibility.

From the news release:

Hewlett Packard Enterprise announced significant advancements to HPE GreenLake, the company’s flagship offering that enables organizations to modernize all their applications and data, from edge to cloud. Now, HPE’s market-leading hybrid cloud platform just got stronger, with a unified operating experience, new cloud services, and availability of HPE GreenLake in the online marketplaces of several leading distributors.

“HPE was among the first to deliver a cloud platform that enables customers to manage and extract insights from their data from edge to cloud, and our continued innovation is driving growth and furthering our market leadership,” said Antonio Neri, president and CEO, HPE. “In the hybrid cloud market, HPE GreenLake is unique in its simplicity, unification, depth of cloud services, and partner network. Today, we are furthering our differentiation, boldly setting HPE GreenLake even further apart as the ideal platform for customers to drive data-first modernization.”

HPE GreenLake supports multi-cloud experiences everywhere – including clouds that live on-premises, at the edge, in a colocation facility, and in a public cloud – and continues to drive strong demand worldwide. In Q1 2022, HPE reported Annual Recurring Revenue of $798 million, and increased as-a-service orders 136 percent year-over-year.

Platform updates include converging Aruba Central, a cloud-native, AI-powered network management solution with the GreenLake platform. Further, a new, unified operational experience that provides a simplified view and access to all cloud services, spanning the entire HPE portfolio, with single sign-on access, security, compliance, elasticity, and data protection.

The HPE GreenLake platform provides the foundation for more than 50 cloud services, including electronic health records, ML Ops, payments, unified analytics, and SAP HANA, as well as a wide- array of cloud services from partners.

HPE also unveiled 12 new cloud services in networking, data services, high performance computing and compute operations management.

HPE GreenLake for Aruba networking. The eight new services simplify the process of procuring and deploying NaaS and allow customers to align network spend to usage needs, while ensuring that the network is always ready to support business objectives. The new services are also optimized for channel partners looking to satisfy growing customer demand for NaaS, to operate in a resale or managed service provider model.

New and enhanced services for block storage and data protection join the current HPE GreenLake data services.

HPE GreenLake for Block Storage is the industry’s first block storage as-a-Service to deliver 100% data availability guarantee built-in on a cloud operational model.

Enhanced HPE Backup and Recovery Service is backup as a service built for hybrid cloud. Customers can effortlessly protect their data for Virtual Machines, gain rapid recovery on-premises, and deliver a cost-effective approach to store long-term backups in the public cloud. HPE Backup and Recovery Service is now available for Virtual Machines deployed on heterogeneous infrastructure.

HPE is further enhancing its HPE GreenLake for High Performance Computing offerings, making it more accessible for any enterprise to adopt the technology, by adding new, purpose-built HPC capabilities. These also include lower entry points to HPC, with a smaller configuration of 10 nodes, to test workloads and scale as needed.

First introduced at HPE Discover 2021, the HPE GreenLake Compute Ops Management is a cloud-native management console to access, monitor, and manage servers. Compute Ops Management easily automates the compute lifecycle management and securely across a customer’s compute environment.

HPE continues to invest in co-development with key distribution partners. First announced in March 2021, HPE GreenLake is now directly available in the cloud marketplaces and ecommerce platforms of ALSO Group, Arrow Electronics, Ingram Micro and TD Synnex.

Finally, HPE announced today a new global agreement with Digital Realty, the largest global provider of cloud-and carrier-neutral data center, colocation and interconnection solutions. Digital Realty allows customers to run any HPE GreenLake service with colocation across Digital Realty’s more than 285 data centers on six continents, which includes sites in 50 major cities, to deliver a rich ecosystem of offerings and world-class business and cloud adjacency.

Claroty Biannual Risk and Vulnerability Report

Cybersecurity risk and vulnerability reports and solutions continue to flood my inbox. We are connecting more things, collecting ever more data, and storing sensitive manufacturing and production analyses. Inquiring minds might like to know what you know. Or, they may want to hold everything hostage. This Claroty Biannual ICS Risk and Vulnerability Report may help you convince management about the need for continual improvement in this area.

Some key findings include:

• ICS vulnerability disclosures grew 110% over the last four years demonstrating heightened awareness of this issue and the growing involvement of security researchers shifting toward OT environments.

• 34% of vulnerabilities disclosed affect IoT, IoMT, and IT assets, showing that organizations will merge OT, IT, and IoT under converged security management.

• 50% of the vulnerabilities were disclosed by third-party companies and a majority of these were discovered by researchers at cybersecurity companies.

• 87% of vulnerabilities are low complexity, meaning they don’t require special conditions and an attacker can expect repeatable success every time.

• 63% of the vulnerabilities disclosed may be exploited remotely through a network attack vector.

We are fast approaching a time when highly connected cyber-physical systems are the norm, and the lines between information technology (IT), operational technology (OT), and Internet of Things (IoT) security management are blurred beyond recognition.

This is the new paradigm of the Extended Internet of Things (XIoT), one that enhances the need for timely, useful vulnerability information in order to better inform risk decisions.

Claroty published its fourth Biannual ICS Risk & Vulnerability Report. The report was prepared by Claroty’s research arm, Team82, in effort to define and analyze the vulnerability landscape relevant to leading automation products and connected devices used across domains.

While the volume of headline-grabbing attacks dwindled in the second half of 2021 compared to the first six months, those incidents will only fuel the eventual prioritization of XIoT cybersecurity among decision makers. You’ll also see from our analysis in this report that the percentage of vulnerabilities that were disclosed in the second half of last year in connected IoT and medical devices, as well as a growing number of IT vulnerabilities, continues to climb, reaching 34%, up from 29% in 1H 2021.

Follow this blog

Get a weekly email of all new posts.