September 17, 2014 Added by:InfosecIsland News
Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Attendees can register online and pay just $1895 for a full conference registration which includes 4 days AND workshops on Monday.
September 16, 2014 Added by:Nate Kube
There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.
September 15, 2014 Added by:Joe Weiss
The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.
September 15, 2014 Added by:Greg Akers
Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.
September 11, 2014 Added by:Thu Pham
If you needed more proof that authentication attacks are on the rise, look no further than the recent JP Morgan Chase data breach.
September 10, 2014 Added by:Tripwire Inc
SSL implementation problems exist in apps of all shapes, sizes and function, ranging from those with little sensitive data and few users to apps with millions of active users handling some of our most sensitive data, such as financial transactions and account login information.
Collective Self-defense: What Japan’s New Defense Policy Means for International Cooperation on Cyber Security
September 04, 2014 Added by:Mihoko Matsubara
Joint exercises are key to making joint operations seamless and increasing the capability of cyber defenses. The Japanese and US governments have committed themselves to revise the US–Japan Defense Cooperation Guidelines by the end of this year and to include bilateral cooperation on cyber security in the revision.
September 03, 2014 Added by:Eduard Kovacs
The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.
August 27, 2014 Added by:Dan Dieterle
According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.
August 26, 2014 Added by:Patrick Oliver Graf
Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.
August 21, 2014 Added by:Identropy
An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.
August 21, 2014 Added by:Joe Weiss
August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.
August 21, 2014 Added by:Mike Lennon
Attendees who register by Friday, August 22 will Save $300 and pay just $1695 for a full conference registration which includes 4 days and pre-conference workshops.
August 20, 2014 Added by:Tripwire Inc
In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.
Compliance and Security Trends... akikah tangerang on 09-19-2014
Carberp Botnet Lifecycle Infographic... akikah tangerang on 09-19-2014
The Benefits of FUD... akikah tangerang on 09-19-2014