NERC CIP Blog
Read the latest news, developments and opinion pieces on NERC CIP compliance from industry experts New Net Technologies.
Click on a link below for information on how you can ensure your IT systems comply with security standards. .
British Gas has acknowledged pressure coming from the cyber-security profession and agreed to take another look at its policy toward password managers, in order to maintain continuous compliance with cyber security controls.
Cyber-attacks on critical national infrastructure (CNI) are growing in volume and sophistication, with destructive attacks far more common than at first thought, according to a new report from Trend Micro and the Organization of American States (OAS).
Research by USA Today reveals that the US power grid suffers some kind of physical or cyber attack every four days.
Of particular interest is the high incidence of cyberattacks, although the most recent ICS-CERT report (the Cyber Emergency Response Team covering all industries utilizing industrial control systems) suggests an even higher incidence of cyber attacks.
The latest ICS-CERT report includes some analysis of cyber security incidents reported to them in Fiscal Year 2014. Of the 245 incidents reported, 55% were attributed to some form of Advanced Persistent Threat (APT), but overall 38% of the 245 incidents remain unexplained:
Two newly discovered vulnerabilities have been classified with a maximum CVSS Score of 10 and users of Schneider Electric ETG3000 FactoryCast HMI Gateway should take immediate action to protect SCADA systems from attack.
This cyber attack will immediately draw comparisons with the infamous Stuxnet attack but does it also mark a tipping point for all industries to take cyber security seriously?
CSOOnline report that the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a division of the U.S. Department of Homeland Security (ICS-CERT) issued an advisory on Tuesday warning that malware has been used since 2011 to attack a number of ICS (Industrial Control Systems).
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.