Category: cyberterrorism Wired Magazine cyber security Joe Weiss cybersecurity DHS Illinois Water Hack Illinois State Terrorism And Intelligence Center -stic Dhs Illinois Water System Hack Control System Cyber Forensics
Submitted by nbartels on Thu, 12/01/2011 - 16:01
Nancy Bartels of Control magazine and ControlGlobal.com hijacking Joe's blog here. This story would be funny if it wasn't so scary. Wired magazine has broken the real story (or the latest iteration of the real story). The link is here. So it wasn't evil hackers from Russia after all.
Category: cybersecurity cyberterrorism SCADA cyber security Dept. of Homeland Security SCADA security DHS Cyber Attack Cyber Cyber Security Hacks Cyber Security Bp Oil Spill Cyber Security Disclosures Illinois Water Hack Illinois State Terrorism And Intelligence Center -stic STIC
Submitted by nbartels on Tue, 11/22/2011 - 14:42
My blog on the Illinois water hack was directly based on a formal disclosure announcement by the Illinois State Terrorism and Intelligence Center - STIC (Note: My blog did not identify the state involved. That disclosure came from DHS).
Category: cybersecurity cyberterrorism cyber security Safety Instrumented Systems Safety Integrity Levels safety standards Safety System Security Safety Cyber Attack Cyber Safety And Security For Computers And Systems Cyber Vulnerability Security Policies Cyber Infrastructure
Submitted by Katherine Bonfante on Thu, 02/10/2011 - 09:17
The industry uses the general term "threat information," but during more detailed discussions, it seems that the information companies seek is more like the traditional military concept of "tactical information."
Category: Applied Control Solutions cyberterrorism cyber security Siemens Joe Weiss Byres Security Eric Byres Cyber Attack Cyber Security Nerc Cips Cyber Vulnerability #pauto #manufacturing Cyber Security Siemens Plc Simatic
Submitted by nbartels on Mon, 07/19/2010 - 15:21
Coming to work on a Monday and finding an email outlining the report of a major cyber security breach affecting an important supplier and its customers is never a good way to start the week. But that's what happened this morning.
Submitted by nbartels on Wed, 04/08/2009 - 16:09
This item appeared on Raw Story this afternoon.
Category: cybersecurity cyberterrorism cyber security Wall Street Journal Walt Boyes Cyber Security Information Sharing Smart Grid Cyber Attack Raw Story
Submitted by nbartels on Wed, 04/08/2009 - 10:57
Walt posted this story on Unfettered this morning. Seems like the Solons over at the Wall Street Journal have finally noticed the electrical grid issue. Good for them. Maybe if this story goes mainstream, more pressure to do something will get applied.
Submitted by nbartels on Tue, 01/27/2009 - 14:49
Two of the worst cyber terrorists in the world were identified today by Addison, Texas-based security firm Credant Technologies. Their names? Stupidity and Carelessness.
Submitted by waltboyes on Mon, 09/15/2008 - 17:19
According to Wired's blog, the Large Hadron Collider at CERN in Switzerland was hacked over the weekend.
Category: NERC cybersecurity ISA99 NRC cyberterrorism FEMA 9/11 Commission Act of 2007 CIPC API Chem ITC IEEE NERC CIP NRC Regulatory Guide
Submitted by Joe Weiss on Wed, 08/13/2008 - 20:52
"FEMA is planning for a voluntary preparedness accreditation and certification program mandated by Title IX of the 9/11 Commission Act of 2007. They intend to establish a common set of criteria for private sector preparedness, including disaster management, emergency management, and business continuity programs. The goal of this voluntary program...
Category: cybersecurity Applied Control Solutions Nuclear Plants 2008 ACS Conference Patch management in SCADA and Process Control cyberterrorism Jake Brodsky commentary SCADA security Hatch2 incident SCADA Terry Childs
Submitted by Joe Weiss on Wed, 07/30/2008 - 10:42
San Francisco and SCADA Jake Brodsky brought up the following, "Do management and law enforcement types have any clue as to how one might regain control of a SCADA system after a rogue employee has secured everyone out of it?" I had planned on saying something at the Conference next...