Critical Infrastructure

Critical Infrastructure | News, how-tos, features, reviews, and videos

intro cyber attack maps
security threats and vulnerabilities

power lines

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

candle laptop blackout

Botnet of smart air conditioners and water heaters could bring down the power grid

If "smart" appliances that connect to the internet were to be used in a botnet, it could cause large-scale blackouts of the power grid, researchers warn.

binary neural network - artificial intelligence - machine learning

Balancing cybersecurity and regulatory compliance

Leveraging artificial intelligence and other advancements is key to protecting critical infrastructure.

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

balint seeber bastille SirenJack

SirenJack: Hackers can hijack emergency alert sirens with a $35 radio and laptop

Emergency alert systems manufactured by Acoustic Technology Inc. can be hijacked and made to play any audio thanks to a vulnerability dubbed SirenJack.

electricity coal power

Combating cyber threats in critical infrastructure through due diligence

Regardless of the implementation method, it’s important for critical infrastructure industries to assess their cybersecurity risks and to protect themselves. An optimal way to start is to adopt the NIST CSF, which will bring depth and...

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

industrial refinery energy plant oil gas

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

cyberwarfare defense illustration

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

salted hash cms hero th3

Salted Hash Ep 14: Are mass transit systems the next big target?

This week Salted Hash talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

IBM, blockchain, Maersk

Defeating 21st Century pirates: the maritime industry and cyberattacks

An increasingly digitized maritime industry needs to keep up with cybersecurity.

padlock with circuitry lock in secure

Protecting business assets

Identifying business assets and connecting your security program to them.

Load More
You Might Also Like