<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint security for engineers' devices in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78200#M4762</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1146191993"&gt;@nttt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;I am responsible for security measures at a manufacturing company. We have numerous software and hardware engineers on staff, and within our internal corporate network, we have:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Operating systems (recently released OS) that are not yet supported by endpoint security tools such as EDR tools,&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Specialized devices (such as oscilloscopes) where endpoint security &lt;A href="https://gamingcy.com/en-us/wow-classic" target="_blank" rel="noopener"&gt;tools&lt;/A&gt; cannot be installed.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;If anyone has experience in handling the security measures for such equipment, I would appreciate your insights.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Since traditional EDR tools won’t work in these cases, other steps can help. One option is network segmentation keeping these devices on separate VLANs with strict access controls to reduce risk. A Zero Trust approach is also useful, allowing only authorized users with the least necessary privileges.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring traffic with network-based security tools like IDS/IPS can help spot any suspicious activity. Even if full security software isn’t available, keeping systems updated is still important to reduce vulnerabilities. It’s also a good idea to limit internet access for these devices to prevent exposure to external threats.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If remote access is necessary, using a VPN with multi-factor authentication adds an extra layer of security. Lastly, making sure engineers are aware of security best practices can go a long way in preventing accidental risks.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Mar 2025 09:56:53 GMT</pubDate>
    <dc:creator>tatssa</dc:creator>
    <dc:date>2025-03-25T09:56:53Z</dc:date>
    <item>
      <title>Endpoint security for engineers' devices</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/77987#M4744</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am responsible for security measures at a manufacturing company. We have numerous software and hardware engineers on staff, and within our internal corporate network, we have:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Operating systems (recently released OS) that are not yet supported by endpoint security tools such as EDR tools,&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Specialized devices (such as oscilloscopes) where endpoint security tools cannot be installed.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;If anyone has experience in handling the security measures for such equipment, I would appreciate your insights.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 12:12:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/77987#M4744</guid>
      <dc:creator>nttt</dc:creator>
      <dc:date>2025-03-18T12:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint security for engineers' devices</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78006#M4747</link>
      <description>&lt;P&gt;Our problem is more the other end.... old devices.&amp;nbsp; Our solution is a network segment that is (mostly) isolated from the rest of the corporate environment and have limited Internet access -- OS updates, software downloads, etc, but no general purpose web browsing.&amp;nbsp; And, the are joined to a "special" Active directory domain that has limited trust.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The engineers may hate it, but they can read their email and browse the web on "standard" devices and reserve the "special" ones for the more sensitive activities.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 20:57:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78006#M4747</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-03-18T20:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint security for engineers' devices</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78042#M4748</link>
      <description>&lt;P&gt;I would echo&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;answer.&amp;nbsp; We did the same at Motorola.&amp;nbsp; Separate subnet for this equipment with strong access controls to limit access.&amp;nbsp; Make use of a whitelisting tool as well.&lt;BR /&gt;&lt;BR /&gt;You also need good inventory on these devices, and for those that eventually CAN have an EDR tool, make sure you know when this is available, so they can be updated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 13:54:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78042#M4748</guid>
      <dc:creator>emb021</dc:creator>
      <dc:date>2025-03-19T13:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint security for engineers' devices</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78200#M4762</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1146191993"&gt;@nttt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;I am responsible for security measures at a manufacturing company. We have numerous software and hardware engineers on staff, and within our internal corporate network, we have:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Operating systems (recently released OS) that are not yet supported by endpoint security tools such as EDR tools,&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;Specialized devices (such as oscilloscopes) where endpoint security &lt;A href="https://gamingcy.com/en-us/wow-classic" target="_blank" rel="noopener"&gt;tools&lt;/A&gt; cannot be installed.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;If anyone has experience in handling the security measures for such equipment, I would appreciate your insights.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Since traditional EDR tools won’t work in these cases, other steps can help. One option is network segmentation keeping these devices on separate VLANs with strict access controls to reduce risk. A Zero Trust approach is also useful, allowing only authorized users with the least necessary privileges.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring traffic with network-based security tools like IDS/IPS can help spot any suspicious activity. Even if full security software isn’t available, keeping systems updated is still important to reduce vulnerabilities. It’s also a good idea to limit internet access for these devices to prevent exposure to external threats.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If remote access is necessary, using a VPN with multi-factor authentication adds an extra layer of security. Lastly, making sure engineers are aware of security best practices can go a long way in preventing accidental risks.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 09:56:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Endpoint-security-for-engineers-devices/m-p/78200#M4762</guid>
      <dc:creator>tatssa</dc:creator>
      <dc:date>2025-03-25T09:56:53Z</dc:date>
    </item>
  </channel>
</rss>

