Overview: The 14th annual NCSAM is coming to a close, and we hope you'll join in to promote a safer, more secure and more trusted Internet for these last few days of the month. The CSIAC and the National Cyber Security Alliance (NCSA) have made it easy to support NCSAM by providing materials for each week that anyone can share at home, at work and school
Topic: Critical Infrastructure Protection (CIP)
Millions of people were affected by wide-spread power outages in the days following hurricanes Harvey and Irma. Utilities worked to get the power on, and smart meters were credited with helping with response and restoration efforts. As the water recedes, there are lingering questions about the critical attributes of a robust and resilient power grid. Join
The energy sector has become an area of increased interest to cyber attackers over the past two years. Most notably, disruptions to Ukraine's power system in 2015 and 2016 were attributed to a cyber attack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced a $640,000 award to the Critical Infrastructure Resilience Institute (CIRI) for research into prepositioned cyber-threats in mobile devices that originate in the supply chain. CIRI, a DHS S&T Center of Excellence (COE) led by the University of
Two weeks ago it was cyberattacks on the Irish power grid. Last month it was a digital assault on U.S. energy companies, including a nuclear power plant. Back in December a Russian hack of a Vermont utility was all over the news. From the media buzz, one might conclude that power grid infrastructure is teetering on the brink of a hacker-induced meltdown.
Both parties will share expertise in protecting the automation environment based on the International Electrotechnical Commission (IEC) 62443 standard and appropriate security measures in the form of events, webinars, and educational material. Together, ISA and Siemens intend to raise awareness and share best practices for industrial security with
The threat is what might be called "weaponized metadata," and the risks are detailed extensively in a new report, Metadata: The Most Potent Weapon in this Cyberwar, recently published by the Institute for Critical Infrastructure Technology (ICIT), a Washington, D.C.-based cybersecurity think tank. ICIT produces many publications annually, but the 28-page
Veracity Industrial Networks said it has delivered on the first phase of its contract with the Department of Energy to provide SDN-based network infrastructure designed to help the U.S. industry, including power utilities, defend against cyberattacks. After several recent hacking events that many security analysts believe were instances of cyberwarfare,
This paper is a result of a cyber risk assessment undertaken with the goal of increasing the cyber awareness of operators of infrastructure, managers, and political leadership. The meaning of cyber has, in our opinion, been aggregated to a bumper sticker label so generic, it means very little of anything to anyone trying to understand cyber risk. Senior
Security researchers confirmed on Monday that a vicious new cyberattack has compromised the computer systems of over 1,000 organizations in 84 countries. Dubbed "Energetic Bear," the Stuxnet-like malware is largely targeting energy and utility companies. It's almost certainly from Russia.