Critical Infrastructure

How Critical Infrastructure Is Vulnerable to Insider Threat

While the insider threat in government agencies and large companies is a known problem, less is known about the insider threat to critical US infrastructure, such as water purification or nuclear power plants. To illustrate the nature of the threats, here are...  [Read More]

Pressure Points – Management and IT

Most organizations have to handle cyber security improvements on the fly; while the business is operating and while other elements of the company are changing and expanding the IT function. A frequent lament is that if everything would just stand still for...  [Read More]

Using Multifactor Authentication to Enhance Access Control

The role of the Chief Information Security Officer (CISO) is expanding just as threats to company data are growing more prevalent. Attacks are occurring more often, and it falls to leaders to set cyber priorities as a key business mandate. Weak or...  [Read More]

Is Cyberespionage Against International Law?

The recent disclosure of a purported Russian cyber-espionage campaign that targeted NATO, the European Union, and Ukraine once again brings the issue of state sponsored cyber espionage to the forefront. Despite Henry Stimson’s view as Secretary of State the “Gentlemen don’t read...  [Read More]

Cyber Attack Recovery Planning is Important for All Businesses

Last week’s Yahoo intrusion has something in common with Viagra, penicillin, and Coca-Cola – all happened by accident. The end result was not what the instigator was looking for. At first, it was thought that the Yahoo intrusion was due to a...  [Read More]

Cyber Security versus Information Security

There are two paths of thought on the issue of Internet and ICT security at the international level. The traditional Western powers in the US, European Union, and Japan speak in terms of “cybersecurity,” the protection of data, networks, and individuals as...  [Read More]

International Efforts in Critical Infrastructure Cyber Security Protection

As result of President Obama’s Executive Order on steps to improve critical infrastructure cybersecurity, the National Institute on Standards (NIST) was tasked to develop a framework to improve U.S. critical infrastructure cybersecurity. Published in February 2012, the framework is the result of...  [Read More]

Health Care Breach Affects 4.5 Million Americans

The relentless assault by hackers on the cyber systems of the nation continues to escalate as news comes of yet another cyber breach that will affect millions of Americans. According to just-released information, Community Health Systems, which runs over 200 hospitals mainly...  [Read More]

Congress Takes Action on Cyber Bill

It’s a bit of a rarity these days when Congress is able to compromise on legislation. However, on July 28 the House passed H.R. 3693, a bill known as the National Cybersecurity and Critical Infrastructure Protection Act of 2014. Passed by a...  [Read More]

Who is Behind Your Firewall?

Having only a perimeter defense is a bad idea, but knowing who is inside your company’s network is a key component of a solid defensive approach to cyber-security. Over the years, your organization may have allowed access to suppliers, customers, partners and...  [Read More]