infosecisland.com infosecisland.com

Real Hacks of Critical Infrastructure are Occurring – Information Sharing is Not Working

June 24th I gave a presentation on ICS cyber security at Cyber Endeavor 2014 at the Naval PostGraduate School and discussed both Aurora and Project Shine. Aurora is a PHYSICAL gap in protection of the electric grid that with the exception of very few utilities, is not being mitigated. Project Shine identifies control systems and control system devices directly connected to the Internet. The DOE representative at Cyber Endeavor stated...

geotips

Technocuffs

Bill Dollins wrote an excellent paean to the positive aspects of vendor lock-in, which is worth a few minutes of your time:Lock-in is a real thing. Lock-in can also be a responsible thing. The organizations I have worked with that make the most effective use of their technology choices are the ones that jump in with both feet and never look back. They develop workflows around their systems; they develop customizations and automation...

feldthoughts

My First Known Interview – Age 4

We’ve all got to start somewhere. Over the weekend my mom gave me a CD with the recording of my first known live interview. I’ve tossed it up on SoundCloud for your listening pleasure. This recording was done by KERA, our Dallas-based public radio and TV station when I was four. It was for a video segment on a painting I had done that showed on Channel 13 (our public TV station.) My mom hasn’t been able to find the video so the...

markheath.net markheath.net

Going Beyond the Limits of Windows Forms

One of the things I explore in my Windows Forms Best Practices course on Pluralsight (soon to be released) is how you can go beyond the limitations of the Windows Forms platform, and integrate newer technologies into your legacy applications. Here are three ways you can extend the capabilities of your Windows Forms applications. 1. Use Platform Invoke to harness the full power of the Windows Operating System Because Windows Forms has...