High-energy transient signals are most often determined to be gamma-ray burst events, but the recently-launched Einstein Probe has expanded astronomers’ ability to quickly respond to similar signals occurring at X-ray wavelengths. Now, a multi-wavelength study of EP240408a concludes that while many of the signal’s characteristics might lead to the conclusion that it is a gamma-ray burst, the non-detection at radio wavelengths precludes that possibility.
Recent News
Students Contribute to New Understanding of ‘Twinkling’ Pulsars
The flexible observing setup of the Green Bank Observatory’s 20-meter telescope enabled frequent, long-duration observations of eight pulsars, spanning two and a half years for a student-driven study carried out by students in the Pulsar Science Collaboratory program.
Double the Disks, Double the Discovery: New Insights into Planet Formation in DF Tau
Tucked away in a star-forming region in the Taurus constellation, a pair of circling stars are displaying some unexpected differences in the circumstellar disks of dust and gas that surround them. A new study led by researchers at Lowell Observatory, combining data from the Atacama Large Millimeter/submillimeter Array (ALMA) and Keck Observatory, has unveiled intriguing findings about planet formation in this binary star system, known as DF Tau, along with other systems in this region.
Industrial Cybersecurity: A Culture Change
The following is an article from UPDATE, the official publication of Utah Petroleum Association, Issue 4 2020.
![riskassessmentmatrix](https://aui.edu/wp-content/uploads/2020/11/riskassessmentmatrix.jpg)
To highlight a few areas of key importance, organizations must set the cyber- security standards they will follow. For example, government agencies closely follow the standards of the National Institute of Standards and Technology (NIST); for OT, that standard would be NIST SP-800-82. Not all the recommendations may be required, as each organization’s infrastructure is different, hence why risk assessments are extremely important. In addition to NIST, other standards include International Organization for Standardization (ISO/IEC), North American Electric Reliability Corporation (NERC-CIP), American National Standards institute or International Society for Automations (ANSI/ISA), and/or Center for Internet Security (CIS). These standards, along with the associated risk characteristics of an organization’s infrastructure, will create the initial draft of policies and procedures. These initial, steps coupled with employee training, are key in creating a strong base for cybersecurity initiatives.
The threats of cybersecurity to OT/ICS environments have expanded drastically across all sectors of industry. Malicious actors have leveraged insider threats, ransomware, networking pivoting, policy violations, and compromising third party relations to gain a foot hold into OT and critical infrastructure networks. Examples include Stuxnet, TRISIS, Shamoon (1-3), and WannaCry. Specifically, in the oil and gas industry, several entities are gaining sophistication in their targeted attacks, including Xenotime, Magnallium, Dymalloy, Chrysene, Hexane, and nation-state or quasi-government actors.
The first step towards securing infrastructure is a culture change that all organizations and their employees need to adopt; that is, making cybersecurity a new priority. Cybersecurity threats are growing, and organizations must respond to protect its people, imagine, community, and the security of our nation.
![thorn](https://aui.edu/wp-content/uploads/2020/11/thorn.jpg)
Terry Horn, Director of Operation Technology, Associated Universities Inc. Woodstar Labs Cybersecurity
Terry Horn joined AUI as a leader in cybersecurity operational technology. He focuses on business development, strategic technologies in industrial control systems (ICS), cybersecurity initiatives, and conducting hands-on assessments for clients and partners within the ICS and operational technology cybersecurity domain.
Related Publications/Contributions:
Author: There is More to Simulation Data, White Paper, Booz Allen, FEB-2016. | Fishing Through SCADA, White Paper, Booz Allen, MAR-2016. | Obtaining SCADA Simulation Data, White Paper, Booz Allen, MAR-2016. | Going Wireless within SCADA, White Paper, Booz Allen, APR-2016. | Manufacturing Control Systems, White Paper, Booz Allen, SEP-2016
Contributor: Cybersecurity Risk Steering Committee; Northeast Big Data Innovation Hub, NYU, Columbia University Control System Cybersecurity Association International
Recent News
NSF VLA Contributes Crucial Puzzle Piece to ‘Peculiar’ High Energy Transient
High-energy transient signals are most often determined to be gamma-ray burst events, but the recently-launched Einstein Probe has expanded astronomers’ ability to quickly respond to similar signals occurring at X-ray wavelengths. Now, a multi-wavelength study of EP240408a concludes that while many of the signal’s characteristics might lead to the conclusion that it is a gamma-ray burst, the non-detection at radio wavelengths precludes that possibility.
Students Contribute to New Understanding of ‘Twinkling’ Pulsars
The flexible observing setup of the Green Bank Observatory’s 20-meter telescope enabled frequent, long-duration observations of eight pulsars, spanning two and a half years for a student-driven study carried out by students in the Pulsar Science Collaboratory program.
Double the Disks, Double the Discovery: New Insights into Planet Formation in DF Tau
Tucked away in a star-forming region in the Taurus constellation, a pair of circling stars are displaying some unexpected differences in the circumstellar disks of dust and gas that surround them. A new study led by researchers at Lowell Observatory, combining data from the Atacama Large Millimeter/submillimeter Array (ALMA) and Keck Observatory, has unveiled intriguing findings about planet formation in this binary star system, known as DF Tau, along with other systems in this region.