Industrial Control Systems

201d6e4b7cd0350a1a9ef6e856e28341

A Wake-up Call to Ignoring Cyber Threats – PG&E Indicted on Criminal Charges

April 07, 2014 Added by:Joe Weiss

On April 1, a federal grand jury indicted PG&E on 12 counts of knowingly and willfully violating the federal Pipeline Safety Act leading to the San Bruno natural gas pipeline rupture.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

CrowdStrike Releases Global Threat Report: Tracked More Than 50 Threat Actor Groups in 2013

January 21, 2014 Added by:InfosecIsland News

CrowdStrike's Intelligence Team tracked more than 50 different threat actor groups believed to be behind the majority of sophisticated threats against enterprises in 2013.

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

Improving SCADA System Security (Part 1)

December 21, 2013 Added by:InfoSec Institute

Supervisory control and data acquisition (SCADA) networks are considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats that could compromise their ordinary operation.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Industrial Control Industry Slow to Adopt Security Configuration Management: Survey

November 13, 2013 Added by:InfosecIsland News

Tripwire unveiled the results of a study comparing risk-based security management in the industrial sector to that of other industries.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

DNP3 Vulnerabilities Part 1 of 2: NERC’s Electronic Security Perimeter is Swiss Cheese

November 07, 2013 Added by:Eric Byres

If you have been following SCADA news in the last month, you might have noticed an avalanche of reports and blogs on new security vulnerabilities in power industry equipment. So far, vulnerability disclosures for 9 products using the DNP3 protocol have been released by the ICS-CERT, with another 21 SCADA product disclosures on their way.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Enough Clucking – Start Fixing the SCADA Security Problem

September 12, 2013 Added by:Eric Byres

I am not a SCADA Apologist. If anything, I consider people like myself and Joel Langill to be SCADA Realists. Clearly Joel and I believe security is important. If we didn’t, we wouldn’t be in this business. And our clients don’t pay us to hear: “Do nothing; it’s the other guy’s fault.”

Comments  (0)

30b156aaa9e421081ba1235658abc523

The Electric Industry: Understanding Cyber Risk is Key to Resource Allocation

August 07, 2013 Added by:Lila Kee

Organizations, especially those involved in the electric industry, must view security investments as a viable risk-reduction tools that not only protect the nation’s way of life, but also investments they have made in their own businesses. To truly understand the risk that critical infrastructures face, and the level of security attention its different sectors require, you must first understand ...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Securing Critical Infrastructure Through Information Sharing

July 24, 2013 Added by:Anthony M. Freed

In this panel discussion industry experts investigate the possible sources and application of the knowledge needed to secure critical infrastructure

Comments  (0)

6d117b57d55f63febe392e40a478011f

The Evolution of Industrial Control System Information Sharing

May 16, 2013 Added by:Anthony M. Freed

The Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, recently issued an advisory warning of an elevated risk of cyber-based attacks against companies that are tasked with administering systems that control elements of our nation’s critical infrastructure.

Comments  (1)

76e662e7786bf88946bd6c010c03ac65

Resilience ‒ The way to Survive a Cyber Attack

May 07, 2013 Added by:Jarno Limnéll

In reality, a well-prepared cyber attack does not need to last for 15 minutes to succeed. After preparations it takes only seconds to conduct the attack which may hit targets next door as well as those on the other side of the world.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Cyber Security Goes Ballistic

April 16, 2013 Added by:Jarno Limnéll

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

April 09, 2013 Added by:Ben Rothke

In Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, authors Eric Knapp and Raj Samani provide and excellent overview on what the smart grid is and how it can be secured.

Comments  (1)

682e0e796084e163c5ca053dd8573b0c

Making Patching Work for SCADA and Industrial Control System Security

April 05, 2013 Added by:Eric Byres

Applying patches is a critical part of good security. According to US-CERT, about 95% of all network intrusions could have been avoided by keeping systems up to date with appropriate patches. What I am against is patching as a knee-jerk reaction to security vulnerabilities. You can’t expect your control system to operate reliably if you don’t have a controlled process for patching.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Threat to Industrial Control Systems from Physical Persistent Design Features (PPDF)

April 01, 2013 Added by:Joe Weiss

Industrial control systems (ICSs) were designed for reliability and safety and to enable system operability and functionality. Many ICSs were originally designed before networking was commonplace. Consequently, cyber security was not a design consideration.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

SCADA and ICS Security Patching: The Good, the Bad and the Ugly

March 26, 2013 Added by:Eric Byres

Let's examine the good, the bad and the ugly details of patching as a means to secure SCADA and ICS systems. And to begin, let’s suppose patches could be installed without shutting down the process...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »