Improving Your Security Posture with the Pipeline Cybersecurity Initiative

A few years ago, I worked alongside some oil commodity traders. Environmental concerns aside, I never realized how many parts were required to get the oil out of the ground, not to mention everything else that finally resulted in the production of refi… Continue reading Improving Your Security Posture with the Pipeline Cybersecurity Initiative

DHS’s cyber wing responds to ransomware attack on pipeline operator

The Department of Homeland Security’s cybersecurity agency recently responded to a ransomware attack on a natural gas compression facility that led the organization to shut down its operations for two days, the agency said Tuesday. The hackers were able to encrypt data on the organization’s IT and “operational technology” network, a broad term for a network that oversees industrial processes. No longer able to read data coming from across its enterprise, the facility shut down its various assets, including its pipelines, for two days. The incident serves as a warning for industrial companies of the ways that ransomware can impact operations. “Although the victim’s emergency response plan did not specifically consider cyberattacks, the decision was made to implement a deliberate and controlled shutdown to operations,” says the advisory from DHS’s Cybersecurity and Infrastructure Security Agency. The unnamed gas facility is back up and running, but CISA said it was releasing […]

The post DHS’s cyber wing responds to ransomware attack on pipeline operator appeared first on CyberScoop.

Continue reading DHS’s cyber wing responds to ransomware attack on pipeline operator

Continuous Integration: What It Is And Why You Need It

If you write software, chances are you’ve come across Continuous Integration, or CI. You might never have heard of it – but you wonder what all the ticks, badges and mysterious status icons are on open-source repositories you find online. You might hear friends waxing lyrical about the merits of …read more

Continue reading Continuous Integration: What It Is And Why You Need It

The danger of third parties: ads, pipelines, and plugins

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.
Categories:

101
FYI

Tags: ad networksadsbreachphonespipelinesupply chainthird party

Continue reading The danger of third parties: ads, pipelines, and plugins

Getting Good at FPGAs: Real World Pipelining

Parallelism is your friend when working with FPGAs. In fact, it’s often the biggest benefit of choosing an FPGA. The dragons hiding in programmable logic usually involve timing — chaining together numerous logic gates certainly affects clock timing. Earlier, I looked at how to split up logic to take better advantage of parallelism inside an FPGA. Now I’m going to walk through a practical example by modeling some functions. Using Verilog with some fake delays we can show how it all works. You should follow along with a Verilog simulator, I’m using EDAPlayground which runs in your browser. The code …read more

Continue reading Getting Good at FPGAs: Real World Pipelining

Pipelining Digital Logic in FPGAs

When you first learn about digital logic, it probably seems like it is easy. You learn about AND and OR gates and figure that’s not very hard. However, going from a few basic gates to something like a CPU or another complex system is a whole different story. It is like going from “Hello World!” to writing an operating system. There’s a lot to understand before you can make that leap. In this set of articles, I want to talk about a way to organize more complex FPGA designs like CPUs using a technique called pipelining.

These days a complex …read more

Continue reading Pipelining Digital Logic in FPGAs

U.S. Pipeline Network Disables Transactions System After Digital Attack

A major U.S. pipeline network temporarily disabled a system that digitally processes customer transactions following a digital attack. Energy Transfer Partners (ETP), a Fortune 500 oil and natural gas company, disclosed the incident on 2 April in a not… Continue reading U.S. Pipeline Network Disables Transactions System After Digital Attack