Critical Infrastructure

Federal government increases its focus on cybersecurity

The U.S. government has recently begun to take concrete steps to help companies protect themselves and one another from the growing threat posed by cyber attackers....  [Read More]

FBI Warning about WordPress Applies to Small Businesses

FBI Warning about WordPress Applies to Small Businesses The FBI issued an alert April 7, 2015 regarding WordPress vulnerabilities. WordPress is a frequently used website software. Plug-ins, or add-on features, are common, allowing flexibility in design. A number of websites that use...  [Read More]

Happy Birthday.com!

Happy Birthday.com! It’s rather hard to believe, but 30 years have now passed since the first .com domain name was registered on March 15, 1985. Fittingly, it was registered to Symbolics – naturally enough a computer manufacturer headquartered in Massachusetts back in...  [Read More]

How Critical Infrastructure Is Vulnerable to Insider Threat

While the insider threat in government agencies and large companies is a known problem, less is known about the insider threat to critical US infrastructure, such as water purification or nuclear power plants. To illustrate the nature of the threats, here are...  [Read More]

Pressure Points – Management and IT

Most organizations have to handle cyber security improvements on the fly; while the business is operating and while other elements of the company are changing and expanding the IT function. A frequent lament is that if everything would just stand still for...  [Read More]

Using Multifactor Authentication to Enhance Access Control

The role of the Chief Information Security Officer (CISO) is expanding just as threats to company data are growing more prevalent. Attacks are occurring more often, and it falls to leaders to set cyber priorities as a key business mandate. Weak or...  [Read More]

Is Cyberespionage Against International Law?

The recent disclosure of a purported Russian cyber-espionage campaign that targeted NATO, the European Union, and Ukraine once again brings the issue of state sponsored cyber espionage to the forefront. Despite Henry Stimson’s view as Secretary of State the “Gentlemen don’t read...  [Read More]

Cyber Attack Recovery Planning is Important for All Businesses

Last week’s Yahoo intrusion has something in common with Viagra, penicillin, and Coca-Cola – all happened by accident. The end result was not what the instigator was looking for. At first, it was thought that the Yahoo intrusion was due to a...  [Read More]

Cyber Security versus Information Security

There are two paths of thought on the issue of Internet and ICT security at the international level. The traditional Western powers in the US, European Union, and Japan speak in terms of “cybersecurity,” the protection of data, networks, and individuals as...  [Read More]

International Efforts in Critical Infrastructure Cyber Security Protection

As result of President Obama’s Executive Order on steps to improve critical infrastructure cybersecurity, the National Institute on Standards (NIST) was tasked to develop a framework to improve U.S. critical infrastructure cybersecurity. Published in February 2012, the framework is the result of...  [Read More]