A Tale of Two Lines

Change is part of daily industrial operations. Detecting a change and assessing the validity of that change are critical to effective ICS cybersecurity. Let’s say, for instance, that two lines have been removed from an SIS configuration file. Now let’s say this change blinds the operator to the availability of the SIS.How will you know this configuration change occurred? This particular change happens deep... Read more

When a Cybersecurity Stranger Calls

Ever since I was a kid, certain movies have stuck with me, surfacing unexpectedly. Some because they are irreverently funny; I still quote Caddyshack when on a golf course. Others because they explore some element of humanity; think The Deer Hunter and Apocalypse Now. And others simply scare the ever loving you-know-what out of me; The Exorcist was definitely one of those. The movie ... Read more

Ladies and Gentlemen, the Captain Has Turned on the No Hacking Sign

Recently, a Colorado man named Chris Roberts was questioned by the FBI for allegedlyhacking the in-flight entertainment system of a United Airlines plane and issuing a command to one of the aircraft engines.  The command caused the plane to climb and tilt in one direction. Mr. Roberts claims to have hacked airplane systems for a number of years and was only caught this time because he tweeted about his attack on... Read more

Customer Perspective: Southern Company Discusses CSI (and No, it’s not the TV show)

Last week at the ARC Forum, James Goosby of Southern Company presented a case study on how Southern is approaching NERC CIP compliance with their Control System Integrity, or “CSI,” initiative. Southern, like all power companies in the US and Canada, faces a looming deadline of April 2016 for NERC CIP Version 5 compliance. Their CSI initiative automates compliance for control systems by:Configuration management... Read more

Displaying results 11-14 (of 14)
 |<  <  1 2 3 >  >|