Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Operators must manage industrial control systems as well as IT environments that are part of critical infrastructure or can form attack surfaces for control systems.
The post Meet critical infrastructure security compliance requirements with Microsoft 365 appeared first on Microsoft Security. READ MORE HERE…

Read more

“We Need COBOL Programmers!” No, You Probably Don’t

Editor’s note: While this topic isn’t entirely security-specific, Trend Micro leader William Malik, has career expertise on the trending topic and shared his perspective. —— There was a provocative report recently that the Governor of New Jersey told reporters that the state of New Jersey needed COBOL programmers. The reason was that the number of…
The post “We Need COBOL Programmers!” No, You Probably Don’t appeared first on . Read More HERE…

Read more

Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks

Advanced technology has changed countless facets of everyday life, from internal enterprise processes to consumer pursuits and beyond. Even the design, management and support for large and small cities has shifted thanks to innovative smart city systems. While advanced components to support utilities, critical infrastructure, traffic and more can bring numerous benefits, these solutions also open…
The post Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks appeared first on . Read More HERE…

Read more

Safeguarding the Nation’s Critical Infrastructure

In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…
The post Safeguarding the Nation’s Critical Infrastructure appeared first on . Read More HERE…

Read more

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora. In March 2007, the US Department of Energy demonstrated the…
The post The Aurora Power Grid Vulnerability and the BlackEnergy Trojan appeared first on . Read More HERE…

Read more

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC). While enterprises struggle to enhance…
The post How the Industry 4.0 Era Will Change the Cybersecurity Landscape appeared first on . Read More HERE…

Read more