Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

San Luis Ray – Emergency Response Plan – Utica College Master’s in CyberSecurity

Psychological damage would result from financial uncertainty or if the attack were launched on another sector in the critical infrastructure such as the electric grid, then psychological effects would be caused by a loss of confidence


Energy sector a prime target for cyber attacks

Experts say the nation's critical infrastructure remains woefully vulnerable

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Slideshow

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

House bill favors private-government cooperation over regulation

National Cybersecurity and Critical Infrastructure Protection Act of 2013 to support country's major infrastructure sectors

National Critical Intelligence Estimate - North Korea - Utica College

The latest from Utica College's series of National Critical Intelligence Estimates - North Korea

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

Experts disagree with ICS-CERT, find issue to be severe

Cloud Computing eGuide

In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read on to learn how to make cloud work for your organization.

What the Internet of Things means for security

With more and more objects are connected via technology these days, it's time to investigate how they can be secured

Spear phishing poses threat to industrial control systems

Hackers don't need Stuxnet or Flame to turn off a city's lights, say security experts

Critical infrastructure risks still high

Attacks are up, sharply, and experts say some utilities may not even know they've been compromised

Major changes ahead as NIST cybersecurity framework nears October publication

Even as the deadline for the NIST cybersecurity framework, developed per an executive order, looms ever nearer, changes are still being implemented

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Your (not-so) smart home

The 'connected' home is technologically advanced and very convenient. Unfortunately, that also makes it an easy in for hackers, too

9/11 Anniversary - Postings from Our Adversaries Ensuring We Never Forget

Bin Laden and Gadahn indictments. KSA courtroom testimony and the Raid on Manhattan Parts 1 and 2 along with the precursor to Inspire - Jihad Recollections

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance'

Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said

DHS cybersecurity appointment seen as government-industry bridge

Appointing McAfee's Phyllis Schneck welcomed given new tension between government, private sector following NSA revelations

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Trend Micro: Hacker threats to water supplies are real

A decoy water control system disguised as belonging to a U.S. municipality, caught the attention of a hacking group tied to the Chinese military

Plans to centralize cybersecurity with DHS seen as step forward

Continuous Diagnostics and Mitigation program would bolster federal continuity, as well as boost security practices at state, local level

SCADA vendor faces public backlash over bug bounty program

IntegraXor offers unique bug bounty program, receives stiff criticism for prize offering

DHS secretary Napolitano's exit leaves leadership vacuum

Departure brings the number of vacant or soon-to-be vacant leadership positions at Homeland Security to 15, seven requiring confirmation

Load More