Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

cso 50 sm
black hat logo

fsb federal security service russia

Spies planted malware on critical infrastructure, Russian security service says

Russian military networks and other critical infrastructure have been hit by tailor-made malware, according to government officials.

flow chart process

It's all about critical processes

Critical processes run the business and should be the targets of risk assessments, pen tests, and vulnerability management procedures.


Digital security officer recruitment challenges and victories on the cyber battlefield

Veteran cybersecurity recruiter and leadership adviser S. A. Spagnuolo, of global executive search firm ZRG Partners, offers greetings to the reading audience, provides a quick primer on his background and sets his agenda going...

petrochemical plant

Stealthy cyberespionage malware targets energy companies

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.

high voltage substation electrical

Security from the outside looking in

Utilities that utilize red team exercises can benefit from the knowledge they produce, so long as you have executive buy in and are willing to take potential criticism.

insider threat

9 critical controls for today's threats

Many controls we've used for years can't effectively deal with today's threats. We must extend some and add others to prevent, detect, and respond to emerging threats to our business operations.

Web attack silently modifies DNS configurations in routers

When you isolate your industrial control systems don't forget about DNS

Many organizations that run industrial control systems, whether they're manufacturers or public utilities, strive to isolate them from the Internet, but sometimes forget to disallow Domain Name System (DNS) traffic, which provides a...

areva nuclear plant

Mysterious malware targets industrial control systems, borrows Stuxnet techniques

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes.

US flag in front of government state capital

'Security Mom' talks about role of cyber in government agencies

Former assistant secretary at the U.S. Department of Homeland Security, says the government needs more skilled cyber security practitioners

power storm power lines electricity overhead power lines 000000583296

Maintaining a utility's security and reputational risk is vitally important

Building a utility's reputation may take years, but it can be damaged or destroyed very quickly from a security event. Reputational risk is regarded as the greatest threat to a company's market value and standing in the community.

gundremmingen nuclear power plant

Is this the nuclear power hack we've all feared? Hardly.

Bavarian nuclear power plant discovers malware.

refinery 109025 1920

Energy infrastructure cyber risk outlook for 2016

Risk predictions in relation to the cyber threat landscape posed by criminals, hacktivists, spies, and cyber warfare.

power transmission towers

Catastrophic cyber attack on U.S. grid possible, but not likely

U.S. critical infrastructure systems still need major security improvements. But experts say that predictions of catastrophe from portions of the electric grid being taken down for months or more by a cyber attack, are overblown.

high voltage line

Defining the threat in the energy sector

What are the categories of adversary faced by the energy sector in 2016? By analyzing their motivation and procedures we gain a better understanding of who might be a target and why.

electric substation infrastructure

At the intersection of energy risk management and facility security

Security professionals in the utility sector must understand the distinct difference between risks, threats, and vulnerabilities and how they all provide useful data points for an effective risk management program. The outputs of this...

high voltage power lines

Protecting vital electricity infrastructure

Attacks on critical infrastructure, specifically electric generation and transmission facilities, could be used to cause widespread panic and create economic distress.There is increased awareness of potential risks to the electric...

energy usage

Public-private cyber threat intelligence sharing necessary in electricity industry

Cybersecurity professionals are hungry for a strategic advantage to battle new denial of service attacks and unauthorized access to systems. The electricity industry has started to focus its efforts on combating the issue head-on...

power lines electric grid

Assessing the U.S. power grid after Ukraine

Security in the U.S. power sector is taken very seriously. But of course security can always be tighter.

Load More
You Might Also Like