Municipal

682e0e796084e163c5ca053dd8573b0c

Time to Speak Up on New IF-MAP Specs for ICS and SCADA Security

February 12, 2013 Added by:Eric Byres

Something I believe industry urgently needs is better standards for information exchange between security solutions. Unfortunately while TCG has had feedback from the IT community, they have received little from the SCADA or ICS community. I encourage everyone involved with SCADA and ICS security to review the specification.

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

US Water System Hacked: A Community-Wide Issue

November 18, 2011 Added by:Robert M. Lee

Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...

Comments  (3)

924ce315203c17e05d9e04b59648a942

New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)

5a432ca05467666d90425b7b869c5003

Is the U.S. prepared for cyber war or are we sitting ducks?

June 17, 2010 Added by:Ron Lepofsky

Last night Pres Obama made a  speech  to the nation about the BP oil spill.  One of his three central points dealt with preventing a future oil spill disaster.  Today the President  told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Presents at Congressional Cybersecurity Event

June 15, 2010 Added by:Marjorie Morgan

Internet Security Alliance President Larry Clinton and ISA Board Member, Jeff Brown, Raytheon, Director of Infrastructure Services and Chief Information Security Officer will take part in a forethcoming Congressional Cybersecurity Caucus Event.

Comments  (0)

6d117b57d55f63febe392e40a478011f

No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)

2ca59fd9c3117f138e722e13597f2b0b

What About Web Smuggling?

May 13, 2010 Added by:Dario Forte

After Viagra, guns and fake medicines, now we can purchase contraband cigarettes online. But the police are always on the alert. Here we discuss a recent Italian case. The Italian Guardia di Finanza (Finance Police) recently completed a longstanding investigation of a criminal organization specialized in Internet sales of tobacco products processed outside of Italy.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Carl Levin Poses Several Cyber Scenarios

April 29, 2010 Added by:Richard Stiennon

Today’s hearing on the nominations of Keith Alexander to head CYBERCOM (and Admiral Winnfield to head NORAD and NORTHCOM) were the first time that  operational responsibilities of CYBERCOM have been discussed in a public forum.

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war

April 27, 2010 Added by:Roman Zeltser

The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...

Comments  (4)

959779642e6e758563e80b5d83150a9f

The Tao of GRC for CISOs and CSOs

March 25, 2010 Added by:Danny Lieberman

The GRC (governance, risk and compliance) market is driven by three factors: government regulation such as Sarbanes-Oxley, industry compliance such as PCI DSS 1.2 and growing numbers of data security breaches and Internet acceptable usage violations in the workplace. $14BN a year is spent in the US alone on corporate-governance-related IT spending . 

Comments  (2)

F338ee966b0240a58cc1dbf24855dd26

Cyber Crime & Terrorism Take a Dangerous Turn

March 24, 2010 Added by:Jenni Hesterman

Most would agree that globalization, fed by technological advances in the information system and telecommunications realms, has overwhelmingly been a "good thing". Our world is connected like never before, and those formerly isolated are now part of the landscape, able to access critical medical information, tap educational resources and answer almost any question in two clicks.

Comments  (4)

6d117b57d55f63febe392e40a478011f

Interview with Former White House CIO Theresa Payton

March 23, 2010 Added by:Anthony M. Freed

I recently had the pleasure of making the acquaintance of the illustrious Theresa Payton, who's long and vibrant career has spanned multiple industry sectors and government service at the highest levels.

Comments  (4)

34200746591339726df9791b17bc885c

In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)

6d117b57d55f63febe392e40a478011f

Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)

B32b392ce3a707f05f4838c48c67d9cf

Good enough security?

October 29, 2009 Added by:Christopher Hudel

We have had 802.1x -- CISCO + Active Directory Integration --  in place for over a year know and it is largely a success; windows systems automatically obtain machine certificates (machines automatically receive certificates when they join the domain), supplicants exist for our IP Phones, and those devices (i.e.: printers)  that are currently incapable of 802.1x are split off in a tightl...

Comments  (2)

B038fefd7a19c26505d1f0671609d8ce

IT Security - Defense in Depth Protection using a Data-centric Model

October 29, 2009 Added by:Mike Cuppett

Start aligning your security strategy to better protect your organization's most critical asset - data. While many security proponents lean toward an outside-in strategy - protect every computer in the company from the outside world first - we really need to understand that the data is the asset that must be protected first and foremost.  The outside-in strategy starts at a macro level and ov...

Comments  (5)

Page « < 1 - 2 - 3 - 4 > »