Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

cyberwarfare defense illustration
coal power station

industrial iot

10 emerging ICS and IIoT cybersecurity companies to watch

Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.

sort filter sift flour separate bake

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

hacking critical infrastructure security

Choose preparation over fear to protect critical infrastructure

Patrick Dennis lines up for a Security Slap Shot on the need to stop using FUD and start making better preparations to protect critical infrastructure.

snow globe security

Increased cyber awareness must lead to equivalent action

Recent ransomware attacks underscore the importance of a unified global response.

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

Davis-Besse Power Station in Oak Harbor, Ohio

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best.

woman shouting into bullhorn

Who cares about smart city security?

There is a fierce debate raging over smart city security, with one side fueling the hype while the other conjures nightmare scenarios. The trouble is that the debate is silent, siloed and unproductive.

coal power station

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

Hurricane Matthew

A guide to business continuity planning in the face of natural disasters

Natural disasters often strike with little to no warning, but their operational and economic impact to organizations can be devastating. Preparation is the best defense against these disasters, and the time for preparing is now –...

us security

Dan Geer: Cybersecurity is 'paramount national security risk'

Cybersecurity and the future of humanity “are conjoined now,” according to In-Q-Tel’s Dan Geer. The cybersecurity futurist, in the closing keynote at SOURCE Boston 2017, gave a sobering look at what is likely to come in a world where...

train rerailment bridge collapse

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

water bubbler fountain drinking

Protecting vital water infrastructure

Safe drinking water is a necessity for protecting public health and safety. Water systems in the United States perpetuate all human activity and properly treated wastewater is vital for preventing disease and protecting the...

coal power station

New report examines the weaknesses of industrial environments

A new report from FireEye examines the attack surfaces shared by a number of industrial enterprise operations, including electric utilities, petroleum companies, and manufacturing organizations. The six weaknesses outlined by FireEye...

smart city pins iot navigation

Getting smarter about building smart cities

Security risks to consider with more interconnected devices used in the critical infrastructure of smart cities

oil rig water

Refuting urban legends of the energy sector

A Houston Chronicle article makes many missteps in its reporting that must be addressed.

Load More
You Might Also Like