Software Integrity Blog

Search Results for 'critical infrastructure'

 

‘Cyber Pearl Harbor’ unlikely, but critical infrastructure needs a major upgrade | NCSAM at Synopsys

Officials have warned for decades of a “cyber Pearl Harbor” or “cyber 9/11” kind of attack on the nation’s critical infrastructure. Yet no attack has come. It’s either because our attackers can’t do it or haven’t really wanted to so far—and “can’t” seems less likely every day. Are we prepared for what’s next? The original version of […]

Continue Reading...

Posted in General

 

How to protect our critical infrastructure | NCSAM at Synopsys

The 2018 Verizon Data Breach Investigations Report (DBIR) reported and analyzed 649 breaches in utilities, transportation, healthcare, and other verticals that employ operational technology (OT) systems in addition to traditional IT for their main operations. In total, that represents 29.2% of reported breaches (not incidents) in industries considered part of infrastructure verticals—and that doesn’t even […]

Continue Reading...

Posted in General

 

Achieve critical infrastructure security with modern networking

Our energy and water infrastructure holds up the world we know, but very few understand how delicate it can be. There is a constant demand to monitor and protect this infrastructure, whose components often have been running nonstop for decades, with few understanding how they work. This hole in the safety net that protects these […]

Continue Reading...

Posted in General

 

President Obama acknowledges cyber threat and signs executive order for improving critical infrastructure cybersecurity

The President’s Executive Order acknowledges the need to secure our critical infrastructure. But cyber security is more than “information sharing” and “frameworks.”

Continue Reading...

Posted in General, Maturity Model (BSIMM)

 

10 critical cloud security threats in 2018 and beyond

Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.

Continue Reading...

Posted in Cloud Security, General

 

Study suggests smart cities lack critical cyber security protections

A new survey of government IT officials faults smart cities with a lack of cyber security protection. A survey of 203 IT professionals working for state and local governments conducted by Tripwire finds 98% of government IT professionals see smart cities as not having adequate protection from cyber attacks. In particular, 27% faulted public Wi-Fi, […]

Continue Reading...

Posted in General

 

Embracing the security benefits of the cloud infrastructure

Originally posted on SecurityWeek Less than ten minutes driving west from my home, you encounter a vast expanse of large, windowless buildings. Situated near them are impressive physical plants dedicated to cooling these buildings and providing back-up power in the case of a power failure. Whenever I drive past these complexes I always point them […]

Continue Reading...

Posted in Cloud Security

 

NIST focuses special publication 800-160 on infrastructure cyber security

With an eye toward use in automobiles, the electric grid, and emergency response teams, the National Institute for Science and Technology (NIST) proposes how organizations can incorporate time-tested security design principles and concepts into these systems from concept to completion in a new publication. Originally available in 2014, Special Publication 800-160: Systems Security Engineering: Considerations […]

Continue Reading...

Posted in Automotive Security, Internet of Things, Security Standards and Compliance

 

Chenxi Wang polishes her 2019 crystal ball

Dr. Chenxi Wang, founder of Rain Capital, shares some of her 2019 cyber security predictions about the cloud, GDPR, blockchain, DevSecOps, privacy, and ICS.

Continue Reading...

Posted in General

 

President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

Making the internet safe and secure in 10 years isn’t going to be easy, if it’s even possible. And that’s why NSTAC’s new proposal is a cyber security moonshot.

Continue Reading...

Posted in General