Critical infrastructures

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We…

12 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

12 years ago

ICS-CERT report, a worrying increase of cyber attacks

It's been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing…

12 years ago

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological…

12 years ago

Wikiboat against the Pentagon, risks on Anonymous evolution

We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government…

12 years ago

US cyber warfare, budget cuts and shortage of cyber experts

The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of…

12 years ago

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the…

12 years ago

Israel between cyber war and cyber warfare business

It's not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare…

12 years ago

In the shadow of the Flame, Warner Bros, China Telecom & US Navy hacks

What's happening while the world's attention is on Flame malware? The cyberspace is a very turbulent place where groups of…

12 years ago

Plan X, new lymph to US cyber warfare capabilities

Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts…

12 years ago

This website uses cookies.