Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

Tenable Network Security serves customers worldwide, and each of Tenable’s customers has a unique set of audit and compliance requirements. This paper provides insights on measuring and reporting compliance in the energy and nuclear facility sectors.

Spotlight

Cyber Conflict Studies Association

The Cyber Conflict Studies Association (CCSA) is a 501(c)3 non-profit organization, dedicated to promoting and leading a diversified and interdisciplinary research agenda to advance the field of cyber conflict. Bringing together national security and information security, CCSA's vision is to foster international dialogue, lead innovative and forward-moving research projects, and serve as a hub for cross-disciplinary conversations and debates on the implications of the emerging field of cyber conflict and cyber operations which, in part, include: cyber warfare; cyber crime; cyber counterintelligence; cyber terrorism, and; cyber deterrence.

OTHER WHITEPAPERS
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More
news image

The State of Mobile App Security 2022

whitePaper | July 28, 2022

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Over the last two years, mobile apps have become critical to success for the majority of businesses.

Read More
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More

Spotlight

Cyber Conflict Studies Association

The Cyber Conflict Studies Association (CCSA) is a 501(c)3 non-profit organization, dedicated to promoting and leading a diversified and interdisciplinary research agenda to advance the field of cyber conflict. Bringing together national security and information security, CCSA's vision is to foster international dialogue, lead innovative and forward-moving research projects, and serve as a hub for cross-disciplinary conversations and debates on the implications of the emerging field of cyber conflict and cyber operations which, in part, include: cyber warfare; cyber crime; cyber counterintelligence; cyber terrorism, and; cyber deterrence.

Events