JOIN US FOR OUR FALL VIRTUAL TRAINING WEEK EVENT OCTOBER 18 - 22 - REGISTRATION IS OPEN! Save Your Spot

Cybersecurity

Cybersecurity March 24, 2011

Stuxnet report III: Worm selects site

Now it is time to turn the table and ask “How might this target protect itself from a worm like Stuxnet?”

Cybersecurity March 15, 2011

OSHA focuses on work safety during North American Occupational Safety and Health Week

Awareness about the importance of preventing work injuries and illnesses presented by OSHA during North American Occupational Safety and Health (NAOSH) Week

By SOURCE: OSHA
Cybersecurity March 14, 2011

Physical Security: Thieves dig for water equipment

Cyber security is a key element for manufacturers to protect against computer-oriented thieves, but no one can over emphasize the importance of physical security

Cybersecurity March 14, 2011

‘Night Dragon’ follow: Six oil firms hacked

Exxon Mobil, Royal Dutch Shell and BP are three of the six major energy companies hit by cyber attacks through Internet servers in China where thieves stole proprietary information, according to officials close to the investigations

Cybersecurity February 14, 2011

ASSE supports OSHA’s injury, illness prevention program standard

The American Society of Safety Engineers has reiterated to the House Committee on Oversight and Government Reform of the society’s support for the Occupational Safety and Health Administration’s development of an injury and illness prevention program standard.

Cybersecurity February 1, 2011

Study: Oil, Gas Cyber Threats Heighten

It is no secret oil and gas companies face cyber security threats on a daily basis, but the level of the attack are becoming more sophisticated and well-organized through criminal syndicates and terrorist groups, according to a new report

By Source: ISSSource.com
Cybersecurity February 1, 2011

Security Risk Publications Hit Street

There is now groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the level of individual systems

By Source: ISSSource.com
Cybersecurity February 1, 2011

Password Reuse – Control Networks Double the Risk

Some control system vendors continue to bury hidden “default” passwords in their system

By Eric Byres, ISSSource.com
Cybersecurity February 1, 2011

Mitigation Strategy Outlined: Stuxnet Video

Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.

By Source: ISSSource.com
Cybersecurity February 1, 2011

Stuxnet: Joint operation nets victim

The newest and strongest clues point toward Stuxnet being an American-Israeli project to sabotage the Iranian’s nuclear program.

By Gregory Hale, ISSSource.com