Blog Posts Tagged with "Infrastructure"


NSA and DoD Warn of Destructive Cyber Attacks

February 21, 2011 Added by:Headlines

"Few weapons in the history of warfare, once created, have gone unused. It is possible to imagine attacks on military networks or critical infrastructure-like our transportation system and energy sector-that cause severe economic damage, physical destruction, or even loss of life"...

Comments  (0)


What’s the Threat? Smart Grid or Dazed Defenders

February 21, 2011 Added by:Ron Lepofsky

NERC CIP standards are written expressly for electrical utilities. If rigorously deployed they are a material step towards security. A more comprehensive set of security control within COBIT, upon which IT SOX compliance is based, should be considered for hardening the electrical grid...

Comments  (0)


Department of Energy Takes on Smart Grid Security

February 19, 2011 Added by:David Navetta

The core team has invited stakeholders from across the utility sector to participate in the initiative, including representatives from the Federal Energy Regulatory Commission, the Department of Homeland Security, and both publicly and privately-owned utilities...

Comments  (1)


Securing Critical Infrastructure at a Snail's Pace

February 11, 2011 Added by:Headlines

"We can continue to pursue outdated strategies and spend our time describing the problem until there is some crisis. Then it is likely that the United States will act, in haste, possibly with unfortunate consequences. Alternatively, we can take action on measurably effective policies...."

Comments  (0)


ENISA Releases Report on Managing Network Resilience

January 25, 2011 Added by:Headlines

The recommendations detail best practices for mitigation efforts for those times when bad situations turn worse, or in ENISA's terms, "when incidents render incident response procedures ineffective and destabilize the management"...

Comments  (0)


Report Concludes Internet Kill Switch is a Bad Idea

January 18, 2011 Added by:Headlines

Instead of centralized control mechanisms such as the kill switch, the report recommends efforts be focused on the further development of strategic computer emergency response teams (CERTS) which can assess situations and affect productive measures to mitigate large scale cyber events...

Comments  (0)


CIOs: Where Information Technology Meets Management

January 14, 2011 Added by:Rahul Neel Mani

As his responsibilities changed, from long-time CIO at HP to Royal Dutch Shell’s first CIO-from-outside to an EVP with Juniper, Mike Rose found the best way to get the job done is not to preach technology or business. He saw his role as helping people find that middle ground...

Comments  (1)


China is Vulnerable to Widespread SCADA Exploit

January 11, 2011 Added by:Headlines

"I'm not sure whats worse, a 0day for the most popular SCADA software in China floating around in the wild or a team of security professionals from China's CERT sleeping behind the wheel..."

Comments  (0)


GovCloud Predictions for 2011

January 02, 2011 Added by:Kevin L. Jackson

2011 will be the breakout year for GovCloud. Pressure to reduce budget, pressure to manage resources better, and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released...

Comments  (0)


Internet Backbone May Be Vulnerable To Attack

December 18, 2010 Added by:Headlines

In 2003, George Mason University PhD candidate Sean Gorman mapped critical fiber optic networks across the U.S. and illustrated that vulnerabilities in the communications infrastructure could easily be identified using data and records available to the general public...

Comments  (0)


Addressing the Post-Stuxnet Landscape

December 16, 2010 Added by:Chris Blask

In the shadow of Stuxnet it is no longer diligent for Control System operators to put off addressing the issue of computer-based attacks on their systems. Neither is it realistic to expect Control System operators to introduce the level of uncertainty intrinsic in securing the Controllers..

Comments  (3)


No Sign of Stuxnet in Critical U.S. Systems - So Far

December 08, 2010 Added by:Headlines

Only a small part of the Stuxnet code would have to be re-written by rogue groups to disrupt SCADA systems. It can be easily done, because all SCADA systems run on Windows. After the arrival of Stuxnet, shutting down the entire power infrastructure of a city is no longer science fiction..

Comments  (0)


Predictive Analysis in the Cloud Infrastructure

November 26, 2010 Added by:Ben Kepes

What happens when you take the sort of predictive analytics that are more commonly used for predicting election outcomes and stock market movement and apply them to cloud infrastructure?

Comments  (0)


Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)

Page « < 9 - 10 - 11 - 12 - 13 > »
Most Liked