Items Tagged with "Infrastructure"
February 11, 2011 Added by:Headlines
"We can continue to pursue outdated strategies and spend our time describing the problem until there is some crisis. Then it is likely that the United States will act, in haste, possibly with unfortunate consequences. Alternatively, we can take action on measurably effective policies...."
January 25, 2011 Added by:Headlines
The recommendations detail best practices for mitigation efforts for those times when bad situations turn worse, or in ENISA's terms, "when incidents render incident response procedures ineffective and destabilize the management"...
January 18, 2011 Added by:Headlines
Instead of centralized control mechanisms such as the kill switch, the report recommends efforts be focused on the further development of strategic computer emergency response teams (CERTS) which can assess situations and affect productive measures to mitigate large scale cyber events...
January 14, 2011 Added by:Rahul Neel Mani
As his responsibilities changed, from long-time CIO at HP to Royal Dutch Shell’s first CIO-from-outside to an EVP with Juniper, Mike Rose found the best way to get the job done is not to preach technology or business. He saw his role as helping people find that middle ground...
January 02, 2011 Added by:Kevin L. Jackson
2011 will be the breakout year for GovCloud. Pressure to reduce budget, pressure to manage resources better, and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released...
December 18, 2010 Added by:Headlines
In 2003, George Mason University PhD candidate Sean Gorman mapped critical fiber optic networks across the U.S. and illustrated that vulnerabilities in the communications infrastructure could easily be identified using data and records available to the general public...
December 16, 2010 Added by:Chris Blask
In the shadow of Stuxnet it is no longer diligent for Control System operators to put off addressing the issue of computer-based attacks on their systems. Neither is it realistic to expect Control System operators to introduce the level of uncertainty intrinsic in securing the Controllers..
December 08, 2010 Added by:Headlines
Only a small part of the Stuxnet code would have to be re-written by rogue groups to disrupt SCADA systems. It can be easily done, because all SCADA systems run on Windows. After the arrival of Stuxnet, shutting down the entire power infrastructure of a city is no longer science fiction..
November 16, 2010 Added by:Headlines
More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...