Software Integrity Blog

Search Results for 'critical infrastructure'

 

Despite ongoing warnings, U.S. critical infrastructure remains vulnerable

The state of ICS security (which protects the industrial control systems that power our critical infrastructure) is worrying. How can we start to improve it?

Continue Reading...

Posted in General

 

‘Cyber Pearl Harbor’ unlikely, but critical infrastructure needs a major upgrade | NCSAM at Synopsys

Officials have warned for decades of a “cyber Pearl Harbor” or “cyber 9/11” kind of attack on the nation’s critical infrastructure. Yet no attack has come. It’s either because our attackers can’t do it or haven’t really wanted to so far—and “can’t” seems less likely every day. Are we prepared for what’s next?

Continue Reading...

Posted in General

 

How to protect our critical infrastructure | NCSAM at Synopsys

The 2018 Verizon Data Breach Investigations Report (DBIR) reported and analyzed 649 breaches in utilities, transportation, healthcare, and other verticals that employ operational technology (OT) systems in addition to traditional IT for their main operations. In total, that represents 29.2% of reported breaches (not incidents) in industries considered part of infrastructure verticals—and that doesn’t even include financial services. So what exactly does that mean?

Continue Reading...

Posted in General

 

Achieve critical infrastructure security with modern networking

Our energy and water infrastructure holds up the world we know, but very few understand how delicate it can be. There is a constant demand to monitor and protect this infrastructure, whose components often have been running nonstop for decades, with few understanding how they work. This hole in the safety net that protects these systems must be repaired. Electric eyes In the United States and Canada, the electric grid is divided into a few major and a handful of minor interconnects. These grids use synchrophasors to monitor real-time information from various points to help keep the grid stable. These smaller devices, along with the far more visible stations that distribute the power, are critical and must be protected. If a unit started to report invalid data, it could trigger changes to grid operation, potentially resulting in power being directed to areas that cannot handle it and away from areas that need it.

Continue Reading...

Posted in General

 

President Obama acknowledges cyber threat and signs executive order for improving critical infrastructure cybersecurity

The President’s Executive Order acknowledges the need to secure our critical infrastructure. But cyber security is more than “information sharing” and “frameworks.”

Continue Reading...

Posted in Maturity Model (BSIMM)

 

10 critical cloud security threats in 2018 and beyond

Don’t let cloud security threats rain on your parade. Explore our list of the top 10 security risks in cloud computing and what you can do to mitigate them.

Continue Reading...

Posted in Cloud Security

 

Study suggests smart cities lack critical cyber security protections

A new survey of government IT officials faults smart cities with a lack of cyber security protection.

Continue Reading...

Posted in General

 

Embracing the security benefits of the cloud infrastructure

Originally posted on SecurityWeek

Continue Reading...

Posted in Cloud Security

 

NIST focuses special publication 800-160 on infrastructure cyber security

With an eye toward use in automobiles, the electric grid, and emergency response teams, the National Institute for Science and Technology (NIST) proposes how organizations can incorporate time-tested security design principles and concepts into these systems from concept to completion in a new publication.

Continue Reading...

Posted in Automotive Security, Internet of Things, Security Standards and Compliance

 

Ask the experts: What’s the top cloud migration security risk?

We’ve gathered some expert opinions about the top cloud migration security risks that organizations should think about when moving to the cloud.

Continue Reading...

Posted in Cloud Security, Featured