Critical Infrastructure

Critical Infrastructure | News, how-tos, features, reviews, and videos

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay
Law enforcement coordination  >  A team of investigators collaborates. [detectives / FBI agents]

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Election security status: Some progress on ballot integrity, but not on Russian interference

With the election less than two months away, government and election officials say voting itself is more secure, but Russian disinformation remains largely unaddressed.

IDG Tech Spotlight  >  Edge Computing [ CSO / September 2020 ]

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

A virtual checkmark in digital system / standards / quality control / certification / certificates

CMMC bakes security into DoD’s supply chain, has value for all businesses

The Cybersecurity Maturity Model Certification provides a means for the DoD to certify the security capabilities of its contractors, but it's a good way to assess the cybersecurity maturity for all companies.

Official vote-by-mail ballot.

Security in the spotlight as the US heads into elections

A new report and tabletop exercise show how the upcoming US elections could be disrupted at the local government level without hacking the election itself.

United States Capitol building / United States Congress / abstract security concept

Many Cyberspace Solarium Commission recommendations expected to become federal law

Dozens of cybersecurity measures designed to protect US businesses and infrastructure are part of the National Defense Authorization Act. Budget, political concerns might eliminate some.

A pattern of Twitter-like bird icons and binary code is broken / breached / hacked.

Twitter hack raises alarm among government officials, security experts

The recent account takeover attack underscores how Twitter and other social platforms have become a critical component of political systems worldwide.

Election security / vulnerabilities / United States flag overlays voting ballot and unsecured lock

Time running out to protect US November elections

Experts say it's too late for significant legislative action to better protect voting this fall, but meaningful changes are still possible.

power plant utilities energy innovation industrial iot american public power association unsplash

New DOE document names China, Russia as threats to US bulk power system

A US Department of Energy RFI seeks information on energy industry's supply chain security practices following executive order to develop industry regulations.

A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.

USA / United States of America stars + stripes and binary code superimposed over The White House

Bipartisan bill could bring back the White House national cyber director role

Cyberspace Solarium Commission leaders introduce the National Cyber Director Act to reintroduce cybersecurity expertise into the White House.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.

iot security

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

Wireless telecommunications tower emanating concentric waves of transmission.

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

A report claims that oversight of Chinese telecoms for security threats to the US communications supply chain is lacking and without adequate authority.

Aerial view of the United States as a nationwide grid.

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.

water infrastructure / wastewater treatment facility / sewage treatment plant

Attempted cyberattack highlights vulnerability of global water infrastructure

Water utilities often have few cybersecurity resources and are subject to few regulations. A failed Stuxnet-like attack on Israel's water supply shows how dangerous that could be.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

No election security funding in latest round of stimulus funding

Doubts raised about funding for 2020 election security and mail-in voting as money omitted from the latest stimulus bill.

A United States postage stamp displayed against a background of red, white and blue question marks.

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed.

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats.

Load More
You Might Also Like