SCADA

5af5a92f9548968dc33daa522c823aa1

3 Requirements for Effective Security Investigations

April 15, 2016 Added by:Tomer Saban

In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too

January 09, 2016 Added by:Joe Weiss

As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report

January 05, 2016 Added by:Eduard Kovacs

Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations From the 2015 ICS Cyber Security Conference

November 10, 2015 Added by:Joe Weiss

2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid

July 31, 2015 Added by:Joe Weiss

The recent Lloyd’s report on cyber implications of the electric grid serves an important need to understand the insurance implications of a cyber attack against the electric grid. Unfortunately, I believe the technical aspects of the hypothesized attack in the Lloyd’s study are too flawed to be used.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)

0ead717779244d9aab5c1699308850d2

'Lotus Blossom' Cyber-espionage Campaign Stretches Back 3 Years: Palo Alto Networks

June 22, 2015 Added by:Brian Prince

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »