ISSSource White Papers

Posts Tagged ‘Night Dragon’

PoS Means Manufacturers Remain Vigilant

By Gregory Hale
It wasn’t too long ago when industrial control systems (ICS) and supervisory control and data acquisition
Read More.

HUG: Proactive Security

By Gregory Hale
It is very easy to take a fatalistic approach to security because it seems attackers have
Read More.

Invensys: Security Awareness on Rise

By Gregory Hale
Levels of cyber security awareness just keep increasing throughout the industry. “From 2006 when I first
Read More.

ICS Patching Ineffective

By Gregory Hale
Patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting
Read More.

Shady RAT: Trillions Stolen; Response Weak

By Richard Sale
One year after U.S. cyber investigators uncovered a five-year-old Chinese hacking venture called Shady RAT that
Read More.

Whitelisting Defense Combat Ready

By Nicholas Sheble
“APTs (advanced persistent threats) are not a ‘what,’ but a ‘who,’” said Daniel Teal the chief
Read More.

070912oil drilling

Securing Real-Time Drilling Data

By Gregory Hale
There is no better term around today that sums up the requirements for oil and gas
Read More.

Securing SCADA Systems from APTs

Editor’s Note: This is Part I of an excerpt from Eric Byres’ Practical SCADA Security blog at Tofino Security.
Read More.

Talk to Me: Stuxnet, Flame a Global Alert

By Gregory Hale
Critical infrastructure organizations should be on alert because they will be the target of a cyber
Read More.

051512kepware-image

Oil & Gas Security: From Field to Boardroom

By Gregory Hale
You never know who is watching. Just ask the oil and gas company executives hit by
Read More.