Month: February 2018

ScadaICSSchneider

Hiccups in HQ Trivia Game Point to Opportunity for Colocation Providers in Delivering Agile Data Centers at the Edge

Credit to Author: Greg Jones| Date: Thu, 22 Feb 2018 16:26:15 +0000

My family has caught the HQ trivia bug, but the app is also bugging us, with its tendency for glitches including stalled video. It appears to be an example of… Read more »

The post Hiccups in HQ Trivia Game Point to Opportunity for Colocation Providers in Delivering Agile Data Centers at the Edge appeared first on Schneider Electric Blog.

Read More
ScadaICSSchneider

How extreme weather causes premature aging in medium voltage equipment

Credit to Author: Thierry Cormenier| Date: Thu, 22 Feb 2018 14:00:17 +0000

If you own or manage any large building, plant, or public infrastructure, you depend on reliable electrical distribution services. You also need equipment to be as sustainable as possible in… Read more »

The post How extreme weather causes premature aging in medium voltage equipment appeared first on Schneider Electric Blog.

Read More
ScadaICSSchneider

Why use virtual reality for medium voltage equipment and safety training?

Credit to Author: Claude Houbart-Santini| Date: Thu, 22 Feb 2018 12:41:12 +0000

Could you make your medium voltage electrical installations safer? There could not be a more important goal. The latest digital training innovations can give students an edge and a perspective… Read more »

The post Why use virtual reality for medium voltage equipment and safety training? appeared first on Schneider Electric Blog.

Read More
MalwareBytesSecurity

Drive-by download campaign targets Chinese websites, experiments with exploits

Credit to Author: Jérôme Segura| Date: Thu, 22 Feb 2018 16:00:00 +0000

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.

Categories:

Tags:

(Read more…)

The post Drive-by download campaign targets Chinese websites, experiments with exploits appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Securing IoT Networks

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 22 Feb 2018 15:28:10 +0000

The typical enterprise has more than 500 applications in place.Q: How do you segment a mesh? A: You can’t. Legacy IoT devices, Industrial Control Systems with custom networking, are exceptionally difficult to secure. Typically, these devices contain only enough compute capabilities to support their primary operational function. They have limited memory, low power, constrained CPU resources, and very little network bandwidth. They do not…

Read More
FortinetSecurity

Securing the Network: What Three Key Verticals Require

Credit to Author: Derek Manky| Date: Thu, 22 Feb 2018 13:45:59 +0000

While new, innovative threats continue to pop up on almost daily, our latest Global Threat Landscape Report reveals that long known and yet still unpatched vulnerabilities continue to serve as the primary gateway for attacks, with organizations reporting an average of 274 attacks per firm – a 82% increase over the previous quarter. This alarming trend emphasizes that while remaining vigilant for new threats and vulnerabilities in the wild is critical, organizations also need to stay focused on what is happening within their own environment.

Read More
FortinetSecurity

Rise of the 'Hivenet': Botnets That Think for Themselves

Credit to Author: Derek Manky| Date: Wed, 21 Feb 2018 13:45:59 +0000

Over the past few years, a new development has occurred: predictive software systems are being programmed using artificial intelligence techniques. The latest advances in these kinds of tools use swarm technology to leverage massive databases of expert knowledge comprised of billions of constantly updated bits of data in order to make accurate predictions.

Read More