article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. One of the scary events that this book described was the Aurora Generator Test in 2007, run by the Idaho National Laboratory.

Malware 52
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. One of the scary events that this book described was the Aurora Generator Test in 2007, run by the Idaho National Laboratory.

Malware 52
article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

New products, services, and consulting partners emerge constantly, each one striving to distinguish itself from the rest. It was something I had envisioned in the 1990s as a consultant, but I was not a software developer, so I never took action. As such risks proliferate and evolve, so do the ways to manage them. This struck me.