Washington, DC, Earth. April 1, 2014 — A critical vulnerability in the BNL Waste Allocator Load Lifter (Earth Class) industrial operating system, allowing remote...
Hi, what are you looking for?
Washington, DC, Earth. April 1, 2014 — A critical vulnerability in the BNL Waste Allocator Load Lifter (Earth Class) industrial operating system, allowing remote...
With Increasingly Automated and Connected Infrastructure, the Ability for an Enemy to Target These Systems Digitally Has Increased
There’s been a lot of debate lately over the role the Cloud has within Critical Infrastructure, and whether or not the Cloud is itself...
What is the state of cyber security in critical infrastructure? Still immature by most standards, but improving steadily thanks to a strong effort from...
Building an ROI for Industrial Cyber Security? Start by Measuring the Business Performance of Real-Time Systems.
It’s no secret that when removed from the direct scrutiny of law enforcement, crime will thrive. Why is this of concern? Because recent studies...
The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. It’s for national security, say those on the...
Information Sharing: The Wrong Information in the Wrong Hands Could Birth a Threat that Simply Can’t be Handled....
If Threat Information is Available But not Fully and Effectively Utilized, Then Knowledge is Not Power
While Raj Samani and I were conducting researching for our recent book, “Applied Cyber Security for the Smart Grid,” there was a lot of...
With Halloween past us, there’s an excess of sugar in our blood, and remnant imaginings of monsters under the bed. So perhaps that’s why...
This is the third in a series of articles on the new “3x3” security model for critical infrastructure cyber security. The first defined the...