From the Archives: Energy Organizations Getting a Handle on Threat Environment
Earlier this morning, Q1 Labs partnered with our Security Intelligence Partner, SourceFire, to present the webinar, “Protect & Defend Your Critical Infrastructure – SCADA, Smart Grid, and...
View ArticleCritical Infrastructure vulnerabilities further exposed at Black Hat
The annual Black Hat conference is renowned for it’s controversial “briefings”, but one in particular has caught the attention of the industry this week. NSS Labs security researcher Dillon Beresford...
View ArticleTony Stark has S.H.I.E.L.D., Q1 Labs has C.S.I.T.
If you’ve watched the Iron Man films or Thor, you should be familiar with the Strategic Homeland Intervention, Enforcement and Logistics Division (SHIELD). But more importantly, if you are involved in...
View ArticleGartner Report Emphasizes Need for New Strategies to Deal with Advanced...
Recently, Gartner published a new report titled “Strategies for Dealing With Advanced Targeted Threats”. The message in this report is how to strategically deal with ATTs (Advanced Targeted Threats),...
View ArticleSmart grids are picking up their deployment pace, but is security monitoring?
With the advent of the “Smart Grid”, the electric and power industry has been progressing through their version of the Renaissance. Historically, the biggest concern for this industry was physical...
View ArticleCritical Infrastructure Security: It's About More than Just Stuxnet.
Last week we held a webcast with our partner Accuvant and talked a bit about the state of critical infrastructure security and how security intelligence can help build a comprehensive security program...
View ArticleA Shot Across the Bow: Five Lessons from the Start of the SCADA Attack Era
While some have claimed the warnings about SCADA system vulnerabilities are merely exaggerations and vendor FUD, this talk should be put to rest with the news that a US utility has suffered real...
View ArticleSuccess at Scale: A Q1 Labs Hallmark
Following their widespread adoption, SIEM and log management solutions have become a staple of many organizations’ security and compliance practices. They are relied on to protect against countless...
View ArticleAre You Drowning in Security Data?
Rich Mogull of Securosis recently wrote a blog entry called “Can You Stop a Targeted Attack?” that nicely complements a Dark Reading article and accompanying report by his colleague, Adrian Lane,...
View Article
More Pages to Explore .....