Municipal

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Event Preview: Suits and Spooks London: Sept. 12, 2014

September 03, 2014 Added by:Eduard Kovacs

The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference Agenda Update

August 15, 2014 Added by:Mike Lennon

The 14th ICS Cyber Security Conference will have 5 major themes: Actual ICS cyber incidents; ICS cyber security standards; ICS cyber security solutions; ICS cyber security demonstrations; and ICS policy issues.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference Opens Call for Papers

July 10, 2014 Added by:Mike Lennon

SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.

Comments  (0)

306708aaf995cf6a77d3083885b60907

DHS Mistakenly Releases 840-pages of Critical Infrastructure Documents

July 09, 2014 Added by:Mike Lennon

The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critical infrastructure points across the United States, in response to a recent Freedom of Information Act (FOIA) request about a cyber-security attack.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta

July 07, 2014 Added by:Mike Lennon

The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Last Chance to Register for Suits and Spooks New York

June 18, 2014 Added by:Mike Lennon

Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

2014 ICS Cyber Security Conference – Mark Your Calendar

June 02, 2014 Added by:Joe Weiss

It's official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Acquires Industrial Control System Cybersecurity Conference Series

April 28, 2014 Added by:InfosecIsland News

SecurityWeek announced that it has acquired the ICS Cybersecurity Conference series, the leading organizer of cybersecurity-focused events for the industrial control systems sector.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

A Wake-up Call to Ignoring Cyber Threats – PG&E Indicted on Criminal Charges

April 07, 2014 Added by:Joe Weiss

On April 1, a federal grand jury indicted PG&E on 12 counts of knowingly and willfully violating the federal Pipeline Safety Act leading to the San Bruno natural gas pipeline rupture.

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Command’s Budget Doubles

January 20, 2014 Added by:Joel Harding

According to the Washington Post, here, the budget of the US Cyber Command has doubled from $212 million to $447 million. This covers the addition of 4,000 staff personnel, among other things.

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Improving SCADA System Security (Part 1)

December 21, 2013 Added by:InfoSec Institute

Supervisory control and data acquisition (SCADA) networks are considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats that could compromise their ordinary operation.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

DNP3 Vulnerabilities Part 1 of 2: NERC’s Electronic Security Perimeter is Swiss Cheese

November 07, 2013 Added by:Eric Byres

If you have been following SCADA news in the last month, you might have noticed an avalanche of reports and blogs on new security vulnerabilities in power industry equipment. So far, vulnerability disclosures for 9 products using the DNP3 protocol have been released by the ICS-CERT, with another 21 SCADA product disclosures on their way.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Snowden Effect is Adverse to his Intentions

October 14, 2013 Added by:Jarno Limnéll

Edward Snowden did not restart a cold war nor did he change the reality of international politics. The consequences of his actions will thwart his original intentions.

Comments  (1)

Page « < 1 - 2 - 3 > »