Cyber Attacks and Critical Infrastructure

February 9, 2016

Over the past several years, there has been intense focus by governments and industry on the potential for cyber attacks on critical infrastructure. Recent events show us that the focus is essential. What is “critical infrastructure?” In his February 12, 2013, Executive Order—Improving Critical Infrastructure Cybersecurity, 1 President Obama borrowed a definition from the USA Patriot Act of 2001, stating that it is “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” This would include such things as telecommunications systems, public health systems, transportation systems, power generation and delivery, water supply, financial services, food production and distribution, government, and public safety.

Spotlight

SCOPE Middle East

SCOPE Middle East is an award winning specialty value-added distributor providing advanced network performance and security solutions in the Middle East & North Africa Region. SCOPE ME has business units around Middle East and GCC countries with significant sales channels for Symantec, Kaspersky Lab, NETSCOUT, Ruckus Networks, Soti, Stormshield, HID Global, Nomadix & Wallarm.

OTHER WHITEPAPERS
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

2023 Cloud Security Trends | Sponsored by AWS Marketplace

whitePaper | January 18, 2023

In the past few years, major cloud providers are improving their security controls for customers and increasing visibility into their security solutions. Emerging trends such as endpoint detection and response and Zero Trust have focused the security community on the capabilities and services of both cloud and solution providers.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

Nasuni Access Anywhere Security Model

whitePaper | December 20, 2022

The Nasuni Access Anywhere add-on service delivers high-performance, VPN-less file access for remote and hybrid users, integrates an organization’s file shares with Microsoft Teams, and provides productivity tools such as desktop synchronization and external file and folder sharing to enhance user productivity and provide access to files seamlessly from anywhere on any device. This white paper outlines the security elements of the Nasuni Access Anywhere service.

Read More

Spotlight

SCOPE Middle East

SCOPE Middle East is an award winning specialty value-added distributor providing advanced network performance and security solutions in the Middle East & North Africa Region. SCOPE ME has business units around Middle East and GCC countries with significant sales channels for Symantec, Kaspersky Lab, NETSCOUT, Ruckus Networks, Soti, Stormshield, HID Global, Nomadix & Wallarm.

Events