Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

balint seeber bastille SirenJack
electricity coal power

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

industrial refinery energy plant oil gas

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

cyberwarfare defense illustration

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

salted hash cms hero th3

Salted Hash Ep 14: Are mass transit systems the next big target?

This week Salted Hash talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

IBM, blockchain, Maersk

Defeating 21st Century pirates: the maritime industry and cyberattacks

An increasingly digitized maritime industry needs to keep up with cybersecurity.

padlock with circuitry lock in secure

Protecting business assets

Identifying business assets and connecting your security program to them.

intel cybersecurity bg 1920

Securing the digital transformation of our critical infrastructure

We must ask how to better protect the critical systems we all rely on.

quell cyber attacks primary

Cyber resiliency – a key to corporate survival (and sleep)

The recent major cybersecurity events – including WannaCry, NotPetya, and most recently, the Equifax data breach – underscore the need for organizations to be able to respond quickly to incidents (in some cases multiple incidents at...

hacker hacked power grid

Hackers gain access to switch off the power in America and Europe

A new Symantec report claims sophisticated hackers have gained sabotage-level access to energy firms in the U.S. and could flip off the power at will.

cyberwarfare defense illustration

Drop a pre-emptive cyber bomb on North Korea?

Cyberwarfare experts share opinions on how to deal with the North Korean cyber threat.

coal power station

Engineering firm exposes SCIF plans and power vulnerability reports

Chris Vickery, director of cyber risk research at UpGuard, Inc., says that a misconfigured Rsync server maintained by Power Quality Engineering, Inc. (PQE) exposed client information pertaining to critical infrastructure for the City...

industrial iot

10 emerging ICS and IIoT cybersecurity companies to watch

Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.

sort filter sift flour separate bake

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

hacking critical infrastructure security

Choose preparation over fear to protect critical infrastructure

Patrick Dennis lines up for a Security Slap Shot on the need to stop using FUD and start making better preparations to protect critical infrastructure.

snow globe security

Increased cyber awareness must lead to equivalent action

Recent ransomware attacks underscore the importance of a unified global response.

Load More
You Might Also Like