Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Cybersecurity standards for grid don't go far enough, critics say

Thursday, April 30, 2009

Some network security experts yesterday questioned the effectiveness of a bill being submitted in Congress today that seeks to secure the nation's electric grid from hackers and foreign spies.

The bill, announced on Wednesday by homeland security committee chairmen Joseph Lieberman in the Senate and Bennie Thompson in the House, would give powers to the Federal Energy Regulatory Commission, or FERC, to issue new orders or rules in the event of a national security threat.

Called the Critical Electric Infrastructure Protection Act, the bill would require FERC to issue updated regulations within 120 days of enactment. Under current law, a nongovernmental organization, the North American Electric Reliability Corporation (NERC), develops standards for power plants and transmission companies for FERC approval.

Michael Jacobs, a former cybersecurity official at the National Security Agency, said the bill doesn't go far enough in compelling owners and operators of power plants to take more safety measures, according to a report on Nextgov.com.

"The bill focuses entirely on requirements of the government - there's nothing in there that obligates or enables the owners and operators of these facilities to upgrade their security," Jacobs said, Nextgov.com reported. "There ought to be an obligation to put in place the necessary barriers to prevent an intruder from getting to the control systems themselves."


View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html