Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

US flag in front of government state capital
power storm power lines electricity overhead power lines 000000583296

gundremmingen nuclear power plant

Is this the nuclear power hack we've all feared? Hardly.

Bavarian nuclear power plant discovers malware.

refinery 109025 1920

Energy infrastructure cyber risk outlook for 2016

Risk predictions in relation to the cyber threat landscape posed by criminals, hacktivists, spies, and cyber warfare.

power transmission towers

Catastrophic cyber attack on U.S. grid possible, but not likely

U.S. critical infrastructure systems still need major security improvements. But experts say that predictions of catastrophe from portions of the electric grid being taken down for months or more by a cyber attack, are overblown.

high voltage line

Defining the threat in the energy sector

What are the categories of adversary faced by the energy sector in 2016? By analyzing their motivation and procedures we gain a better understanding of who might be a target and why.

electric substation infrastructure

At the intersection of energy risk management and facility security

Security professionals in the utility sector must understand the distinct difference between risks, threats, and vulnerabilities and how they all provide useful data points for an effective risk management program. The outputs of this...

high voltage power lines

Protecting vital electricity infrastructure

Attacks on critical infrastructure, specifically electric generation and transmission facilities, could be used to cause widespread panic and create economic distress.There is increased awareness of potential risks to the electric...

energy usage

Public-private cyber threat intelligence sharing necessary in electricity industry

Cybersecurity professionals are hungry for a strategic advantage to battle new denial of service attacks and unauthorized access to systems. The electricity industry has started to focus its efforts on combating the issue head-on...

power lines electric grid

Assessing the U.S. power grid after Ukraine

Security in the U.S. power sector is taken very seriously. But of course security can always be tighter.

power grid electrical

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.

ted koppel 2008

Ted Koppel’s new book tells a good story but lacks facts

In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section.

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

ted koppel

Ted Koppel discusses the inevitable cyberattack on U.S. infrastructure

Ted Koppel, author of "Lights Out" speaks to CSO about the risks of a catastrophic cyberattack on U.S. infrastructure, and how government has no apparent plan to deal with the results.

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

Bringing IT and OT together

In another life I spent just shy of nine years in the ICS space. I worked on the IT security side of the house and helped to shore up defenses. One of the troublesome aspects of this role was the disconnect between IT and OT, or...

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

Load More