Blog Posts Tagged with "ICS"
September 30, 2016 Added by:Joe Weiss
Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).
September 15, 2016 Added by:Joe Weiss
At the 2016 ICS Cyber Security Conference we will be providing a demonstration and will take the SEL-751A used in a traditional motor control setting and compromise not only the SEL751A, but then take control of the motor.
US Critical Infrastructures are Being Targeted by Actors in the Middle East – But Attribution is Difficult
November 19, 2015 Added by:Joe Weiss
The availability of ICS cyber exploits, and the lack of attribution, there should be more concern about the very viable cyber threat to our critical infrastructures.
November 10, 2015 Added by:Joe Weiss
2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure
October 06, 2015 Added by:Mike Lennon
Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.
September 18, 2015 Added by:Joe Weiss
The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta (www.icscybersecurityconference.com ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....
June 22, 2015 Added by:Idan Aharoni
Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.
December 22, 2014 Added by:Joe Weiss
With all of the focus on cyber security one could expect that DHS is doing a credible job in helping to protect our country. Unfortunately, that may not be the case.
September 16, 2014 Added by:Nate Kube
There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.
July 09, 2014 Added by:Mike Lennon
The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critical infrastructure points across the United States, in response to a recent Freedom of Information Act (FOIA) request about a cyber-security attack.
April 07, 2014 Added by:Joe Weiss
On April 1, a federal grand jury indicted PG&E on 12 counts of knowingly and willfully violating the federal Pipeline Safety Act leading to the San Bruno natural gas pipeline rupture.
September 12, 2013 Added by:Eric Byres
I am not a SCADA Apologist. If anything, I consider people like myself and Joel Langill to be SCADA Realists. Clearly Joel and I believe security is important. If we didn’t, we wouldn’t be in this business. And our clients don’t pay us to hear: “Do nothing; it’s the other guy’s fault.”
May 16, 2013 Added by:Anthony M. Freed
The Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, recently issued an advisory warning of an elevated risk of cyber-based attacks against companies that are tasked with administering systems that control elements of our nation’s critical infrastructure.
April 12, 2013 Added by:Eric Byres
This week, Eric looks at the pros and cons of using compensating controls as an alternative to patching, and discuss the requirements for success.
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
April 09, 2013 Added by:Ben Rothke
In Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, authors Eric Knapp and Raj Samani provide and excellent overview on what the smart grid is and how it can be secured.
April 05, 2013 Added by:Eric Byres
Applying patches is a critical part of good security. According to US-CERT, about 95% of all network intrusions could have been avoided by keeping systems up to date with appropriate patches. What I am against is patching as a knee-jerk reaction to security vulnerabilities. You can’t expect your control system to operate reliably if you don’t have a controlled process for patching.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015