malware rss sort by issue

Issue 02/2020

Cyber security for critical infrastructure

Many power stations and industrial plants are not equipped to deal with a new generation of malware that targets industrial automation and control systems

Critical infrastructure, ranging from traffic lights to manufacturing plants and power stations, are coming under increasing attack as a new generation of malware specifically targets industrial automation and control systems (IACS). These systems include the supervisory control and data acquisition (SCADA) technology and human machine interfaces (HMI) that are at the very heart of the assets that keep modern society safe and functioning.

2019
Issue 06/2019

Protecting manufacturing from cyber attacks

Adopting a risk-based approach and erecting defence-in-depth architecture to ensure business continuity is the best way to protect the manufacturing sector and other critical infrastructure.

Half of the manufacturing companies that took part in a recent survey in the US admitted they had suffered a data breach or cyber attack in the previous 12 months. Unfortunately, such attacks are part of a growing global trend as the Industrial Internet of Things (IIoT) accelerates the convergence of the once separate domains of IT and operational technology (OT). This has made cyber security intrusions and threats not only more difficult to detect but also to prevent. 

Issue 06/2019

New standard to boost nuclear power installations’ cyber resilience

The scope and cost of cyber-malicious activities are increasing worldwide.

According to Cybersecurity Ventures' Cyber Crime Annual Report 2019, the annual cost of cyber crime for the global economy will double between 2015 and 2021 to reach USD 6 trillion by 2021. In addition to financial losses, attacks on critical infrastructure are of growing concern.

2018
Issue 03/2018

Staying one step ahead

Cyber security and the role of International Standards

Innovation brings new challenges – or, put another way, every silver lining has a cloud. While the Internet has given us connected, smart and interactive technologies, it has also spawned the murky, underground world of cyber crime.