Power Plant

The Weakest Link – Protecting Industrial Control Systems

Like water flowing downhill, attackers will take the path of least resistance to compromise a system. Old technology that doesn’t learn new tricks is a prime target.

The ACM published an article in the Communications of the ACM by Keith Kirkpatrick which delves into security issues with SCADA systems.

Read on about SCADA systems and the security implications of old technology.

Feature Image / License

Read More »
Breaking news - companies do not care about your security or privacy

Marriott and Equifax – A Tale of Two Breaches

Recently there were two huge data breaches of two very large companies. Both organizations collected a ton of information about their clients. The breaches were both spectacular in scope. Furthermore, both were among the largest known data breaches.

I see a large contrast between the Marriott breach and the Equifax breach. The difference between the two massive breaches clearly demonstrates the importance of basic security methods.

Read More »
cybersecurity

National Cyber Security Awareness Month – Low Hanging Fruit

Since 2004 the Department of Homeland Security has organized October as National Cyber Security Awareness Month. The goal is to promote cyber security to help keep Americans safe online. Fast forward 14 years and the security landscape has only become more dangerous. More opportunities exist for online abuses than ever before. The proliferation of internet connected devices that comprise the IOT creates additional attack surfaces which often have security as an afterthought instead of baked into the design.

Today I want to focus on the low hanging fruit i.e. the easy wins we can achieve to significantly improve our online safety and security. Read on to see the simple things most people can do to improve their situation.

Feature Photo: Image / License

Read More »