DHS Sheds Light on Recent Infrastructure Cyber Attacks

LARRY O'BRIEN | August 7, 2018

article image
DHS recently held several webinars in the wake of its March announcement regarding Russian state sponsored hacking group Energetic Bear/Dragonfly on utilities and critical infrastructure installations in the US.  Recent comments from DHS officials indicate that these attacks had hundreds of victims and demonstrated the ability of these groups to gain operational control of critical infrastructure industrial control systems (ICS).  The National Cybersecurity and Communications Integration Center (NCCIC) recently held a series of webinars that addressed Russian activity against critical infrastructure, with the last webinar held on August 1.  You can download the slides from the webinar here. The webinar focused on some of the more interesting and unique aspects of these recent attacks plus some countermeasures that end users can implement right now that can greatly reduce the likelihood of future attacks.  A detailed explanation of the attack methodology can be found in this DHS publication NCCIC Alert TA18-074A.

Spotlight

Leading Point Software

Leading Point Software Ltd. is a world-class company, providing comprehensive IT Solutions, Business Systems, Professional Consultancy Services, to Enterprises of all sizes. We have a solid performance and reputation in the technology industry for providing excellent services and products to our clients. Our services empowers organization to digitally transform their businesses, increase performance at all levels, maximize growth and cut cost.

OTHER ARTICLES

Super Blueprints Integrate the 5G Open Source Stack from Core to Door

Article | June 1, 2021

There is an exciting convergence in the networking industry around open source, and the energy is palpable. At LF Networking, we have a unique perspective as the largest open source initiative in the networking space with the broadest set of projects that make up the diverse and evolving open source networking stack. LF Networking provides platforms and building blocks across the networking industry that enable rapid interoperability, deployment, and adoption and is the nexus for 5G innovation and integration. LF Networking has now tapped confluence on industry efforts to structure a new initiative to develop 5G Super Blueprints for the ecosystem. Major integrations between the building blocks are now underway–between ONAP and ORAN, Akraino and Magma, Anuket and Kubernetes, and more.

Read More

As Edge Applications Multiply, OpenInfra Community Delivers StarlingX 5.0, Offering Cloud Infrastructure Stack for 5G, IoT

Article | June 2, 2021

StarlingX—the open source edge computing and IoT cloud platform optimized for low-latency and high-performance applications—is available in its 5.0 release today. StarlingX combines Ceph, OpenStack, Kubernetes and more to create a full-featured cloud software stack that provides everything carriers and enterprises need to deploy an edge cloud on a few servers or hundreds of them.

Read More

The world is ready for 5G. Are you?

Article | June 3, 2021

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

Leading Point Software

Leading Point Software Ltd. is a world-class company, providing comprehensive IT Solutions, Business Systems, Professional Consultancy Services, to Enterprises of all sizes. We have a solid performance and reputation in the technology industry for providing excellent services and products to our clients. Our services empowers organization to digitally transform their businesses, increase performance at all levels, maximize growth and cut cost.

Events