ICS/SCADA
Cloud computing in critical information infrastructure protection
ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …
Critical flaw lets attackers control hospital, military buildings’ systems
A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …
SCADA password cracking code available
ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Vulnerability of oil and gas infrastructure drives security investments
Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …
Company’s industrial heating system hacked via backdoor
An FBI memo circulated internally and shared with New Jersey law enforcement this last summer has recently been published and tells of a compromise of the industrial control …
Security experts debate moving critical infrastructure online
Paul Simmonds, Co-Founder of The Jericho Forum, has suggested that companies attempting to reduce costs by moving critical systems online could be opening themselves up to …
Researchers finds 23 vulnerabilities in SCADA software
The recent revelation that Malta-based start-up ReVuln is offering only to paying customers information about SCADA zero-day vulnerabilities has spurred security researcher …
SCADA software bugs leave national critical infrastructure vulnerable
This week, 23 vulnerabilities in industrial control software – specifically SCADA software – from several vendors have reportedly been found by a researcher at …
Cyber-Ark secures privileged accounts
Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …
Info about 0-day SCADA flaws offered for sale
Following in the footsteps of French Vupen Security, Malta-based start-up ReVuln has also decided to sell information about zero-day vulnerabilities to companies and …
Software backdoor makes critical infrastructure vulnerable to attacks
Ever since Stuxnet managed to disrupt the workings of the Natanz nuclear facility, the security of industrial control systems (ICS) has deservedly received a lot of attention. …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy