Protecting Against Critical Infrastructure Attacks: Nuclear & Otherwise
The Nuclear Regulatory Commission (NRC) was the target of three separate breaches, according to DarkReading.com and NextGov.com.
Thu T. Pham is a product marketing manager at Duo Security, now part of Cisco. She leads Cisco Zero Trust portfolio messaging and positioning. Thu has ten years experience in the tech and information security fields, as well as a BS in Journalism from Central Michigan University.
The Nuclear Regulatory Commission (NRC) was the target of three separate breaches, according to DarkReading.com and NextGov.com.
According to an analyst at CERT/CC’s Vulnerability Notes Database, certain Netgear switches contain hard-coded passwords that can allow a remote attacker to authenticate to the web server running on the device.
> When it comes to the 2014 Verizon Data Breach Investigations Report (DBIR), web application, cyber-espionage and POS intrusions topped off the list of most frequently occurring categories of data breaches.
Breaches of card data and point of sale systems often involve remote access management tools, as attackers scan for remote administration software, then use automated tools to break into weakly protected systems.
According to the IBM Security Services 2014 Cyber Security Intelligence Index, over 95 percent of all incidents investigated recognize human error as a contributing factor.