{"id":3048,"date":"2016-07-08T16:26:31","date_gmt":"2016-07-08T16:26:31","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=3048"},"modified":"2016-07-08T16:26:31","modified_gmt":"2016-07-08T16:26:31","slug":"unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/","title":{"rendered":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities"},"content":{"rendered":"<p>This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d still in use across the U.S. government. According to the report, \u201cThe Strategic Automated Command and Control System coordinates the operational functions of the United States\u2019 nuclear forces, such as intercontinental ballistic missiles, nuclear bombers, and tanker support aircrafts. This system runs on an IBM Series\/1 Computer\u2014a 1970s computing system\u2014and uses 8-inch floppy disks.\u201d Many reading this article may have worked on similar systems when they were much younger.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d still in use across the U.S. government. According to the report, \u201cThe Strategic Automated Command and Control System coordinates the operational functions of the United States\u2019 nuclear forces, such as intercontinental ballistic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12149,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[11],"tags":[],"class_list":["post-3048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-08T16:26:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Unsung cybersecurity vulnerabilities in US infrastructure and utilities\",\"datePublished\":\"2016-07-08T16:26:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/\"},\"wordCount\":103,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/1208-2.jpg\",\"articleSection\":[\"NSFOCUS in the News\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/\",\"name\":\"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/1208-2.jpg\",\"datePublished\":\"2016-07-08T16:26:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/1208-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/1208-2.jpg\",\"width\":614,\"height\":365,\"caption\":\"Trend of exploits from 1990 to 2019.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unsung cybersecurity vulnerabilities in US infrastructure and utilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/","og_locale":"pt_BR","og_type":"article","og_title":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS","og_description":"This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d","og_url":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/","og_site_name":"NSFOCUS","article_published_time":"2016-07-08T16:26:31+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS","twitter_description":"This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated \u201clegacy systems\u201d","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","twitter_misc":{"Escrito por":"NSFOCUS"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities","datePublished":"2016-07-08T16:26:31+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/"},"wordCount":103,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","articleSection":["NSFOCUS in the News"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/","url":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/","name":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","datePublished":"2016-07-08T16:26:31+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/1208-2.jpg","width":614,"height":365,"caption":"Trend of exploits from 1990 to 2019."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/unsung-cybersecurity-vulnerabilities-us-infrastructure-utilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Unsung cybersecurity vulnerabilities in US infrastructure and utilities"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/3048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=3048"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/3048\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12149"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=3048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=3048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=3048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}