Hackers Testifying at the United States Senate, May 19, 1998 (L0pht Heavy Industries)

The L0pht Legacy

20 Years Ago, Some Hackers Visited Congress… May 19th, 1998. I was just wrapping up my first year of college. My grades were terrible. Instead of going to classes, I had been ...
ICS/SCADA, The Protectors

ICS/SCADA, The Protectors

Superb journalism in the form of an article posted by Ellen Nakashima and Aaron Gregg of The Washington Post detailing critical work of United States National Security Agency trained malware hunters - ...
U.S. Infrastructure Vulnerable Russia

U.S. Infrastructure Vulnerable to Russia (and Others)?

The U.S. Cyber Emergency Response Team (US-CERT) issued an alert March 15, “Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors” – Alert TA18-074A. It wasn’t necessarily an ah-ha moment ...
Security Boulevard
Operational Visibility for Load Balanced Traffic in SDDC

Operational Visibility for Load Balanced Traffic in SDDC

Management and monitoring in Software Defined Data Centers (SDDC) benefit from automation principles, programmability, API and policy-driven provisioning of application environments through self-service templates. These best practices help application owners to define, ...
What Does a Windstorm in Wyoming Have to Do with Cyber Security?

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down ...
Joe Goldberg

Increase Visibility in the Cloud

The public cloud market is blowing up. Many IT admins are realizing they don’t have the same visibility into their infrastructure that they once did. The worldwide public cloud services market is ...
Global Undersea Cables Vulnerable to Russia's Special Ops

Global Undersea Cables Vulnerable to Russia’s Special Ops

British defense officials have added their voice to those of others highlighting the threat posed by the capabilities of the Russian military and intelligence entities to the soft underside of the global ...
Security Boulevard

Lessons Learned from the Estonian National ID Security Flaw

Estonia recently suffered a major flaw in the security of their national ID card. This article discusses the fix and the lessons learned from the incident: In the future, the infrastructure dependency ...

Remote Hack of a Boeing 757

Last month, the DHS announced that it was able to remotely hack a Boeing 757: "We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a ...
David Bisson

Securing our Critical Infrastructure – What You Need to Know

The post Securing our Critical Infrastructure – What You Need to Know appeared first on CCSI ...
Loading...