March 22, 2017
Via: CIOThe debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation. But it hasn’t been settled – in some ways it is more intense […]
February 14, 2017
Via: CSO OnlineExpect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data — by shutting down entire computer systems to utilities or factories. “I see no reason for ransomware to stop,” […]
February 2, 2017
Via: Computer WeeklyThe idea that hackers could switch off a country’s electricity, water, oil and gas supplies is a nightmare scenario – but it could happen. Many senior managers in utilities, transportation, healthcare and manufacturing are unaware of the security risks in […]
Virus & Malware, Vulnerabilities
September 26, 2016
Via: CSO OnlineTo put it in somewhat technical terms, the nation’s industrial control systems (ICS) – part of its critical infrastructure – are not only vulnerable to compromise, they are likely compromised right now. Paul Dant, chief strategist and managing principal at […]
July 18, 2016
Via: Kaspersky BlogAs we keep saying, it’s very important to be aware of the latest cyber-security news and threats. Being prepared is more than half the battle. However, even those who know everything there is to know about cyber-security, who use reliable […]
June 15, 2016
Via: Russel EdwardsThe December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via […]
June 9, 2016
Via: The HillThe House Homeland Security Committee on Wednesday advanced a bill that would restructure how the Department of Homeland Security (DHS) protects critical infrastructure from digital threats. “This bill removes bureaucratic barriers at DHS so it can more effectively carry out […]
Network security, Vulnerabilities
June 1, 2016
Via: TrendMicro BlogA a lot of enterprises today are not fully prepared for securing or managing their blind spot “SSL traffic” into the network. Because SSL has traditionally been beyond the reach of network security systems it has become a serious security […]
February 25, 2016
Via: SC MagazineAn advance persistent threat group operating since at least 2010 has recently been concentrating its efforts on infiltrating Japanese critical infrastructure and key commercial interests, according to cyber-security firm Cylance, which went public with its findings yesterday due to the […]
February 1, 2016
Via: Help Net SecuritySmart grids provide real-time information on the grid, perform actions when required without any noticeable lag, and support gathering customer consumption information. On the downside, smart grids however, provide an increased attack surface for criminals. For instance, smart meters can […]
January 15, 2016
Via: The HillThe U.S. government has seen a rise in cyber-attacks that penetrate industrial control systems, a top cyber-security official said Wednesday. “We see more and more [cyber-attacks] that are gaining access to that control system layer,” said Marty Edwards, director of […]
November 2, 2015
Via: The HillThe U.S. isn’t spending enough to defend its power grid from cyber-attacks, President Obama warned on Thursday as he declared November Critical Infrastructure Security and Resilience Month. The move is part of the administration’s efforts to promote better funding for […]
September 25, 2015
Via: cloud-securityIf your organization is like most, you’re likely using or considering cloud-hosted #applications and #infrastructure. Security in the cloud is just as important as security in on-premises IT environments, though it’s different in several important ways. There are many great […]
September 3, 2015
Via: cloud-securityWhen was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck … well, if not terror, then certainly groans in the […]
August 18, 2015
Via: cloud-securityWith SDP, organizations can create an ‘invisible’ infrastructure that only authorized users and devices can access. Here’s why it’s time has come. In recent times the security industry has lamented the dissolution of the network perimeter. The era of strong […]
April 30, 2024
April 11, 2024
April 30, 2024