SCADA
Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)
October 09, 2018 Added by:Eduard Kovacs
Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.
Comments (0)
Category #1 Cyberattacks: Are Critical Infrastructures Exposed?
November 07, 2017 Added by:Jalal Bouhdada
Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.
Comments (0)
Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!
June 14, 2017 Added by:Mike Lennon
What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!
Comments (0)
Smart Cities Must Be Secure Cities
April 14, 2017 Added by:Jack Huffard
The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.
Comments (0)
Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence
April 06, 2017 Added by:Larry Karisny
The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.
Comments (0)
The Forgotten Security Frontier: The Phone Call
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
Comments (0)
Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
Comments (0)
Demonstration of Destructive Cyberattack Vector on “Air-gapped” Systems
September 30, 2016 Added by:Joe Weiss
Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).
Comments (0)
3 Requirements for Effective Security Investigations
April 15, 2016 Added by:Tomer Saban
In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.
Comments (0)
Bringing Innovation into Cyberdefense Technologies
February 22, 2016 Added by:Larry Karisny
When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.
Comments (0)
Yes. The World Needs More Security Predictions
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
Comments (0)
The Age of Advanced Threats Has Arrived
January 15, 2016 Added by:Luis Corrons
The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.
Comments (0)
Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too
January 09, 2016 Added by:Joe Weiss
As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?
Comments (0)
BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report
January 05, 2016 Added by:Eduard Kovacs
Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part II)
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part I)
December 01, 2015 Added by:Steve Durbin
Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.
Comments (0)
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019
- Strategies for Winning the Application Security Vulnerability Arms Race