LAS VEGAS - McAfee FOCUS 2012 - Solving security challenges to critical infrastructure companies requires partnerships between vendors, a panel of solution providers and experts said today at McAfee's Focus conference in Las Vegas.
Working closely with suppliers, explained Gary Woodward, director of business development at Emerson Process more
An agreement between Westinghouse Electric Company and McAfee will see the former provide McAfee Enterprise Security Manager and Network Intrusion Protection to new and existing nuclear power plants.
"This agreement will help us deliver cyber security in accordance with some of our industry associations' best practices and guidelines," more
Critical infrastructure protection (CIP) has been one of the primary roles of armies throughout history. Dr Gareth Evans discovers how our increasing dependence on modern communication, transport and commodity networks are being threatened by modern forms of warfare, as we go deeper into the digital age.
While the character of the key assets more
“You need to be paranoid. You need to assume your system is under attack,” said Andrew Ginter, director of industrial security at Waterfall Security Solutions.
That is part of what a user must think about when they are a victim of an advanced persistent threat (APT) like Stuxnet, Ginter said during his talk Tuesday with Joel Langill, chief technology officer at more
1. Waterfall Has More Control System “Connectors”
A “connector” allows what is typically two-way traffic to be sent through a one-way security device. You essentially install a protocol or application client / server on both sides of their device. The secure side server gets the information as usual, then pushes it out to the insecure side server using more
The security chief at the North American Electric Reliability Corp. (NERC) is calling for better designed and more hardened systems in the wake of the Stuxnet malware threat.
The Stuxnet Trojan quickly gained the attention of the security industry because it was one of the first pieces of malware to use multiple previously unknown vulnerabilities. more
Abstract: Practically every corporation that is connected to the Internet uses firewalls as the first line of its cyber-defense. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point more
Computer hackers have begun targeting power plants and other critical operations around the world in bold new efforts to seize control of them, setting off a scramble to shore up aging, vulnerable systems.
Cyber criminals have long tried, at times successfully, to break into vital networks and power systems. But last month, experts for the first time discovered more
The discovery of the first worm to target networks controlling power plants points has prompted an expansion of specialized forensic teams to combat the cybersecurity threat.
The Department of Homeland Security (DHS) plans to ramp up a program that sends specialized forensic teams to combat the cybersecurity threat on U.S. critical control systems more
In the USA today, Siemens is strongly warning its users that Trojan, which is the name of a certain malware program is directly targeting PCS 7 as well as Simatic WinCC. This virus is further distributed with the use of USB memory sticks. The sad part is that it is very good at taking advantage of the present vulnerabilities of Microsoft security. more