Critical Infrastructure

Critical Infrastructure news, information, and how-to advice


San Luis Ray – Emergency Response Plan – Utica College Master’s in CyberSecurity

Psychological damage would result from financial uncertainty or if the attack were launched on another sector in the critical infrastructure such as the electric grid, then psychological effects would be caused by a loss of confidence

Energy sector a prime target for cyber attacks

Experts say the nation's critical infrastructure remains woefully vulnerable

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other

Slideshow

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

House bill favors private-government cooperation over regulation

National Cybersecurity and Critical Infrastructure Protection Act of 2013 to support country's major infrastructure sectors

National Critical Intelligence Estimate - North Korea - Utica College

The latest from Utica College's series of National Critical Intelligence Estimates - North Korea

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

Experts disagree with ICS-CERT, find issue to be severe

What the Internet of Things means for security

With more and more objects are connected via technology these days, it's time to investigate how they can be secured

Spear phishing poses threat to industrial control systems

Hackers don't need Stuxnet or Flame to turn off a city's lights, say security experts

Critical infrastructure risks still high

Attacks are up, sharply, and experts say some utilities may not even know they've been compromised

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

Major changes ahead as NIST cybersecurity framework nears October publication

Even as the deadline for the NIST cybersecurity framework, developed per an executive order, looms ever nearer, changes are still being implemented

Your (not-so) smart home

The 'connected' home is technologically advanced and very convenient. Unfortunately, that also makes it an easy in for hackers, too

9/11 Anniversary - Postings from Our Adversaries Ensuring We Never Forget

Bin Laden and Gadahn indictments. KSA courtroom testimony and the Raid on Manhattan Parts 1 and 2 along with the precursor to Inspire - Jihad Recollections

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance'

Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

DHS cybersecurity appointment seen as government-industry bridge

Appointing McAfee's Phyllis Schneck welcomed given new tension between government, private sector following NSA revelations

Trend Micro: Hacker threats to water supplies are real

A decoy water control system disguised as belonging to a U.S. municipality, caught the attention of a hacking group tied to the Chinese military

Plans to centralize cybersecurity with DHS seen as step forward

Continuous Diagnostics and Mitigation program would bolster federal continuity, as well as boost security practices at state, local level

SCADA vendor faces public backlash over bug bounty program

IntegraXor offers unique bug bounty program, receives stiff criticism for prize offering

Load More