WhitePapers

Integrated Safety: Hiking Effectiveness

Throughout oil and gas operations in the Gulf of Mexico and the U.S. Southwest, safety systems that have been working since the 1970s and ’80s are reaching the end of their already extended life cycles. Spare parts are becoming harder to find and stock …

White Paper: Energy Grid a Prime Target

If a rogue state, terrorist, or malcontent wanted to debilitate a major city or even an entire country, how could it make a widespread, immediate, and lasting impact? Quite simply, just strike at the facilities that produce and distribute the electrica …

Big Data, Bigger Opportunities

Smart grid deployments are creating exponentially more data for utilities and giving them access to information they’ve never had before. Accessing, analyzing, managing, and delivering this information – to optimize business operations and enhance cust …

Performance‐Based Gas Detection

The design of hydrocarbon gas detection systems using risk analysis methods is drawing attention because industry experts have come to a consensus that design codes used in traditional gas detection system design work are not sufficient for open-door p …

Symantec Threat Report for 2011

Symantec blocked more than 5.5 billion malicious attacks in 2011; an increase of more than 81% from the previous year. This increase was in large part a result of a surge in polymorphic malware attacks, particularly from those found in Web attack kits …

Advanced Persistent Threats Landscape

Advanced Persistent Threats (APTs) are the hottest and most lethal of cyberattacks, and even the most sage security pros say they are almost impossible to prevent. There is, however, a white paper that goes into detail on the APT landscape. There is an …

Cyber Security Special Report

By Shawn Gold “May you live in interesting times,” often referred to as the Chinese curse, seems to be a good fit for where we have found ourselves over the past several years. The importance of server- and network-based IT solutions for automation sys …

McAfee: State of Security

Information is intrinsic to the core of any business. Most organizations would find it impossible to function without the availability and absolute privacy of their proprietary – and priceless – information. Therefore, securing it across the extended e …

7 Steps to ICS, SCADA Security

The past two years have been a real wakeup call for the industrial automation industry. For the first time ever there is proof the industry has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu. If you are a process con …

A New Approach to Whitelisting

Software Restriction Policies (SRP) enables administrators to control which applications are allowed to run on Microsoft Windows. SRP is a feature of Windows XP and later operating systems. A user can configure it as a local computer policy or as domai …

Utility Cyber Security Trends

Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand. …

McAfee, SDA Cyber Security Report

For the moment, the “bad guys” have the upper hand – whether they are attacking systems for industrial or political espionage reasons, or simply to steal money – because the lack of international agreements allows them to operate swiftly and mostly wit …

Applying NERC-CIP CAN-0024

Under the direction of the Federal Energy Regulatory Commission (FERC), the North American Electric Reliability Corporation (NERC) is charged with enforcing reliability standards for the Bulk Electric System (BES) in North America. Reliability standard …

Symantec Report: Spam Down

Global spam is now at the lowest it has been since November 2008, when the rogue ISP McColo was closed-down. The effect on spam volumes back then were very dramatic and spam accounted for 68.0% of global emails. More recently the decline has been much …

McAfee: Series of Cyber Attacks

Is it new or is it just garnering more attention? At any rate, over a 5-year period, there was a series of cyber attacks on the networks of 72 organizations globally, including the United Nations, governments and corporations. To read the McAfee white …

Microsoft Security Intelligence Report

This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans. The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar ye …

UL Functional Safety Mark Program

With the advent and evolution of functional safety standards in North America and Europe, UL is now offering a UL Functional Safety Listing Mark that can be added for those qualifying companies in the process of getting a traditional Listing from UL. A …

Post Stuxnet Industrial Security

Following its discovery in June 2010, the Stuxnet worm caused a worldwide sensation. It is the first publicly known rootkit attack targeted at industrial plants. It has infected tens of thousands of PCs, and abused and manipulated automation software r …

McAfee Report: ‘Night Dragon’

Hackers who appear to be in China have conducted a coordinated campaign of cyber espionage against major Western energy companies, according to a report from cyber security firm McAfee. The following white paper shares the details from the McAfee repor …

Securely Providing Access to Manufacturing Data

Security today is a necessary part of every manufacturing operation that expects to run smoothly, efficiently, safely, and profitably. But protecting the industrial environment is far from an easy job. As production equipment and the systems that conne …

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest