OPSWAT mobile hardware offers infrastructure security for the air gap
A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense. READ MORE HERE…
A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense. READ MORE HERE…
Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Operators must manage industrial control systems as well as IT environments that are part of critical infrastructure or can form attack surfaces for control systems.
The post Meet critical infrastructure security compliance requirements with Microsoft 365 appeared first on Microsoft Security. READ MORE HERE…
Editor’s note: While this topic isn’t entirely security-specific, Trend Micro leader William Malik, has career expertise on the trending topic and shared his perspective. —— There was a provocative report recently that the Governor of New Jersey told reporters that the state of New Jersey needed COBOL programmers. The reason was that the number of…
The post “We Need COBOL Programmers!” No, You Probably Don’t appeared first on . Read More HERE…
Advanced technology has changed countless facets of everyday life, from internal enterprise processes to consumer pursuits and beyond. Even the design, management and support for large and small cities has shifted thanks to innovative smart city systems. While advanced components to support utilities, critical infrastructure, traffic and more can bring numerous benefits, these solutions also open…
The post Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks appeared first on . Read More HERE…
In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…
The post Safeguarding the Nation’s Critical Infrastructure appeared first on . Read More HERE…
At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora. In March 2007, the US Department of Energy demonstrated the…
The post The Aurora Power Grid Vulnerability and the BlackEnergy Trojan appeared first on . Read More HERE…
Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC). While enterprises struggle to enhance…
The post How the Industry 4.0 Era Will Change the Cybersecurity Landscape appeared first on . Read More HERE…
A former National Security Agency contractor pleaded guilty Tuesday to espionage, becoming the first person to be prosecuted under the Trump administration for leaking classified information. READ MORE HERE…
The stolen data included “secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020,” American officials said. READ MORE HERE…
The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files. READ MORE HERE…