Tag: critical infrastructure protection

Quando ocorreu o ataque do WannaCry, tive interesse em iniciar uma investigação  para saber a sua origem e como o ataque foi desenvolvido. O que encontrei foi que a exploração usada remonta os vazamentos de informações de um grupo hacker que aconteceram no ano passado e neste ano. Foram cinco vazamentos realizados por hackers e ...
Read Blog
Cuando tuvo lugar el ataque de WannaCry, me interesé en iniciar una investigación acerca de su origen y de cómo se desarrolló el ataque. Encontré que la explotación usada remonta a las fugas de información de un grupo hacker que sucedieron el año pasado y este año. Los hackers llevaron a cabo cinco fugas; una ...
Read Blog
Estamos acompanhando a transformação digital e assistindo cada vez mais coisas serem conectadas. Essa evolução cria ambientes bastante heterogêneos, formados por diversas tecnologias, com diversas funções desenvolvidas por diversos fabricantes. O ambiente de segurança também é bastante diversificado. Atualmente são necessários muitos consoles para gerenciar diversas funcionalidades. Esse cenário acaba criando brechas, pois quando as ...
Read Blog
Estamos acompañando la transformación digital y viendo cada vez más cosas siendo conectadas. Esa evolución crea ambientes bastante heterogéneos, formados por diversas tecnologías, con diversas funciones desarrolladas por diversos fabricantes. El ambiente de seguridad también es bastante diversificado. Actualmente son necesarias muchas consolas para gestionar diversas funcionalidades. Ese escenario acaba creando brechas, pues cuando las ...
Read Blog
“We’re here to pinch your best ideas.” Those words began Mayor of London, Sadiq Khan’s remarks to a small group of city officials, regulators and private industry in New York City’s financial district this morning.  The discussion was focused on cities, climate change and the use of technology to address it while improving citizens’ lives. ...
Read Blog
This blog post was written by Raja Patel. Traditional IT security solutions need modifications to successfully defend critical infrastructure on tomorrow's cyber battlefields. There has recently been a great amount of discussion regarding critical infrastructure and its inherent security vulnerabilities. Critical infrastructure primarily comprises aging supervisory control and data acquisition (SCADA) and industrial control systems ...
Read Blog
This blog post was written by Raja Patel. Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even the latest shiny new technology. ...
Read Blog
By Kent Landfield, Director of Standards and Technology Policy, McAfee, and Malcolm Harkins, Chief Security and Privacy Officer at McAfee When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at McAfee were familiar with the details, as we had participated extensively in the public ...
Read Blog
Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be ...
Read Blog