SCADA
SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020
August 12, 2020 Added by:InfosecIsland News
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference, being held October 19 – 22, 2020 in SecurityWeek’s Virtual Conference Center, has been extended to August 31st.
Comments (0)
Thoughts on DoS Attack on US Electric Utility
June 04, 2019 Added by:Phil Neray
The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.
Comments (0)
Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)
October 09, 2018 Added by:Eduard Kovacs
Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.
Comments (0)
Category #1 Cyberattacks: Are Critical Infrastructures Exposed?
November 07, 2017 Added by:Jalal Bouhdada
Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.
Comments (0)
Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!
June 14, 2017 Added by:Mike Lennon
What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!
Comments (0)
Smart Cities Must Be Secure Cities
April 14, 2017 Added by:Jack Huffard
The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.
Comments (0)
Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence
April 06, 2017 Added by:Larry Karisny
The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.
Comments (0)
The Forgotten Security Frontier: The Phone Call
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
Comments (0)
Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
Comments (0)
Demonstration of Destructive Cyberattack Vector on “Air-gapped” Systems
September 30, 2016 Added by:Joe Weiss
Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).
Comments (0)
3 Requirements for Effective Security Investigations
April 15, 2016 Added by:Tomer Saban
In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.
Comments (0)
Bringing Innovation into Cyberdefense Technologies
February 22, 2016 Added by:Larry Karisny
When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.
Comments (0)
Yes. The World Needs More Security Predictions
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
Comments (0)
The Age of Advanced Threats Has Arrived
January 15, 2016 Added by:Luis Corrons
The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.
Comments (0)
Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too
January 09, 2016 Added by:Joe Weiss
As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?
Comments (0)
BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report
January 05, 2016 Added by:Eduard Kovacs
Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider