SCADA

F45df53d99605d46f5ae32b7bed9fe22

The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Iran Attacking Critical Infrastructures - Cylance Report

December 04, 2014 Added by:Joe Weiss

This is not an “I told you so” note. It is a note expressing concern that our critical infrastructure organizations such as NERC, FERC, NRC, NEI, AWWA, and others do not appear to be taking this threat seriously.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Sifting Fact from Fiction with All Writs and Encryption: No Backdoors

December 04, 2014 Added by:Electronic Frontier Foundation

Following recent reports in the Wall Street Journal and Ars Technica, there’s been new interest in the government’s use of a relatively obscure law, the All Writs Act.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

The Biggest Cyber Threats Against Three At-Risk Verticals: Retail, Healthcare and Finance

December 03, 2014 Added by:Patrick Oliver Graf

In this “post-privacy” era, network administrators need to understand cyber threats against them, inside and out, in order to set up the strongest defenses.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

FBI Warns of Major Malware-Based Attacks Following the Sony Pictures Hack

December 02, 2014 Added by:Pierluigi Paganini

According to the Reuters Agency, the malicious code described in the alert could be the attack vector used by threat actors in the incident occurred to the Sony Pictures.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Internet of Things: Hack My Nannycam

December 01, 2014 Added by:Tripwire Inc

The logic is – if cybersecurity is weak today (and the average Joe has no idea how truly breached our Internet fabric is), it may be even worse tomorrow with the advent of explosive IoT capabilities. Here’s why I say that.

Comments  (0)

65be44ae7088566069cc3bef454174a7

4 Privacy Predictions for 2015

December 01, 2014 Added by:Rebecca Herold

I was asked to provide a few predictions for 2015. Based upon not only what I’ve seen in 2014, but also foreshadowing from the past two-three decades, here are some realistic possibilities.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Operation Onymous Challenges Tor to Strengthen Its Security

November 19, 2014 Added by:Tripwire Inc

Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Centralization: The Hidden Trap

November 19, 2014 Added by:Brent Huston

What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Launching in 2015: A Certificate Authority to Encrypt the Entire Web

November 18, 2014 Added by:Electronic Frontier Foundation

Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Cyber Threats in 2015: New Attack Vectors, More Severe Incidents

November 18, 2014 Added by:Patrick Oliver Graf

One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Arrogance of the US Nuclear Power Industry - We Don't Want to Look at Everything

November 17, 2014 Added by:Joe Weiss

In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

How Can ICS Cyber Security Risk be Quantified and What Does it Mean to Aurora

November 13, 2014 Added by:Joe Weiss

Risk is defined as frequency times consequence. There is little information on frequency of ICS cyber attacks.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

How to Steal Data From an Airgapped Computer Using FM Radio Waves

November 12, 2014 Added by:Tripwire Inc

More and more organisations today have some airgapped computers, physically isolated from other systems with no Internet connection to the outside world or other networks inside their company.

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »