Source: ISSSource.com
Articles
New Reactor Cooks Up Solar Energy
Using a common metal found in self-cleaning ovens, it may soon be possible to concentrate solar energy and use it to efficiently convert carbon dioxide and water into fuel.
Study: Oil, Gas Cyber Threats Heighten
It is no secret oil and gas companies face cyber security threats on a daily basis, but the level of the attack are becoming more sophisticated and well-organized through criminal syndicates and terrorist groups, according to a new report
China Alert: Hole in SCADA Software
Wellintech, the Chinese software provider that publishes KingView, a very popular supervisory control and data acquisition (SCADA) program in China, issued a patch for a vulnerability that could affect a plant’s production processes.
Working Around Nuke Design Flaw
Engineering workers at the nuclear power plant near Berwick, PA, detected a design flaw in a temperature control system that could have shut down the two reactors, the Nuclear Regulatory Commission (NRC) reported.
Guide to Secure Next Internet Protocol
There is now a way to deploy the next generation Internet Protocol (IPv6) securely.
Security Risk Publications Hit Street
There is now groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the level of individual systems
Gulf Disaster: Comparing Regulatory Climate
The Deepwater Horizon disaster in the Gulf of Mexico occurred off the coast of the United States, but a similar incident could happen anywhere there is offshore drilling.
Gulf Spill Report: A Preventable Disaster
The failed Deepwater Horizon oil rig relied too heavily on engineers following complex data for long periods of time, instead of providing automatic warning alerts.
McAfee: Cyber threats in 2011
A new year always brings with it the possibilities of great things, however it also brings predictions on what the new cyber threats will be for the year.
Mitigation Strategy Outlined: Stuxnet Video
Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.