Remove 10
Remove 2018 Remove Energy and Utilities Remove Government Remove Risk
article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

Although none of the violations resulted in any reported outages, NERC concluded that the cumulative effect of the violations posed a serious risk to the reliability of the bulk U.S. Critically, the utility had in place an internal compliance program at the time of the violations. Settlement Agreement at 12.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. That’s Gartner’s estimate of global spending on cybersecurity in 2017 and 2018. The first worm of note that accomplished this was Stuxnet.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Permissioned blockchains, or private blockchains,aren’t truly decentralized because they’re organized by a governance structure and authentication process for nodes. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Risk of compromise.