Toe-to-toe with the Roosskies

Toe-to-toe with the Roosskies

Russia is hardly, if at all, deterred by sanctions. Until Uncle Sam puts his kinetic foot down, Russian Intrusions and campaigns will continue and most likely increase.

The next wave? Modular component malware against industrial control safety systems

The next wave? Modular component malware against industrial control safety systems

While there exist no imminent, specific, directly attributable credible threats against energy infrastructure in North America, attacks against Ukraine’s energy sector have occurred each December since 2015.

Eugene Kaspersky and the terrible, horrible, no good, very bad day

Eugene Kaspersky and the terrible, horrible, no good, very bad day

Cyber is sexy. Physical, not-so-much. You need to embrace them both when you're dealing with security.

Global cyber reconnaissance against the energy sector

Global cyber reconnaissance against the energy sector

Media blares that our nuclear plants are compromised. Media is wrong. Again.

PETYA – Darwinism applied to cyberspace

PETYA – Darwinism applied to cyberspace

PETYA ransomware struck on 27 June. The cure was released in April. Why did anyone get infected?

CRASHOVERRIDE poised to affect Natural Gas?

CRASHOVERRIDE poised to affect Natural Gas?

New malware affecting Ukraine's electric grid poses a future threat to US natural gas industry

Refuting urban legends of the energy sector

Refuting urban legends of the energy sector

A Houston Chronicle article makes many missteps in its reporting that must be addressed.

Myth-busting the urban legends surrounding the energy sector

A U.S. newspaper recently printed an article, "Hacked: Energy industry controls provide an alluring target for cyberattacks", focusing on purported cybersecurity weaknesses across the energy sector. John Bryk sets the record straight....

Grizzlygate - U.S. Government evidence falls short in blame on Russian hackers

Grizzlygate - U.S. Government evidence falls short in blame on Russian hackers

GRIZZLY STEPPE is the U.S. code name for the hack against the DNC emails. The U.S. directly blames Russia but the evidence falls short. Far short.

Act or react? Fostering a tactical mindset within the private sector

Act or react? Fostering a tactical mindset within the private sector

The law of self-defense is an almost universally accepted concept. Perhaps the time has come to overlay this concept onto the cyber battleground.

Will iot folks learn from DDoS attack on Krebs’ Web site?

Will iot folks learn from DDoS attack on Krebs’ Web site?

The IoT enables everyday objects to become botnet zombies. Did your doorbell just break the internet?

Maturity models can compel your leadership to action

Maturity models can compel your leadership to action

Maturity models can help you to paint a clear and compelling picture of the gap between threat and preparation.

Energy infrastructure cyber risk outlook for 2016

Risk predictions in relation to the cyber threat landscape posed by criminals, hacktivists, spies, and cyber warfare.

Defining the threat in the energy sector

What are the categories of adversary faced by the energy sector in 2016? By analyzing their motivation and procedures we gain a better understanding of who might be a target and why.

Top Blog Posts