
Utility Management Group
Senior decision-makers come together to connect around strategies and business trends affecting utilities.
Shared Link
At least 24 agencies run Pulse Secure software. How many were hacked is an open question. - CyberScoop
In this case, the Pulse Connect Secure exploits could serve as a key entry point into a data-rich network.
The hackers’ “primary goals are maintaining long-term access to networks, collecting credentials, and stealing proprietary data,” said Charles Carmakal, a senior vice president at Mandiant, FireEye’s incident response practice.
The software supply chain continues to provide hackers an easy entry point into federal and corporate networks, and will continue to do so, until software customers get serious about proactive software supply chain risk assessments to prevent harmful software from being installed.
Energy Central is hosting a PowerTalk on 5/6 describing best practices for proactive software supply chain risk assessments.
I hope to see you on 5/6
At least 24 agencies run Pulse Secure software. How many were hacked is an open question. - CyberScoop
At least two-dozen U.S. federal agencies run the Pulse Connect Secure enterprise software that two advanced hacking groups have recently exploited, according to the Department of Homeland Security’s cybersecurity agency. Multiple agencies have been brea
Discussions
No discussions yet. Start a discussion below.
Get Published - Build a Following
The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.
If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.
Sign in to Participate