Critical Infrastructure

Critical Infrastructure news, information, and how-to advice

lighthouse beam beckons to a businessman in a boat on a sea of red tape
smart city pins iot navigation

salted hash cms hero th3

Salted Hash Ep 14: Are mass transit systems the next big target?

This week Salted Hash talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

IBM, blockchain, Maersk

Defeating 21st Century pirates: the maritime industry and cyberattacks

An increasingly digitized maritime industry needs to keep up with cybersecurity.

padlock with circuitry lock in secure

Protecting business assets

Identifying business assets and connecting your security program to them.

intel cybersecurity bg 1920

Securing the digital transformation of our critical infrastructure

We must ask how to better protect the critical systems we all rely on.

quell cyber attacks primary

Cyber resiliency – a key to corporate survival (and sleep)

The recent major cybersecurity events – including WannaCry, NotPetya, and most recently, the Equifax data breach – underscore the need for organizations to be able to respond quickly to incidents (in some cases multiple incidents at...

hacker hacked power grid

Hackers gain access to switch off the power in America and Europe

A new Symantec report claims sophisticated hackers have gained sabotage-level access to energy firms in the U.S. and could flip off the power at will.

cyberwarfare defense illustration

Drop a pre-emptive cyber bomb on North Korea?

Cyberwarfare experts share opinions on how to deal with the North Korean cyber threat.

coal power station

Engineering firm exposes SCIF plans and power vulnerability reports

Chris Vickery, director of cyber risk research at UpGuard, Inc., says that a misconfigured Rsync server maintained by Power Quality Engineering, Inc. (PQE) exposed client information pertaining to critical infrastructure for the City...

industrial iot

10 emerging ICS and IIoT cybersecurity companies to watch

Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.

sort filter sift flour separate bake

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

hacking critical infrastructure security

Choose preparation over fear to protect critical infrastructure

Patrick Dennis lines up for a Security Slap Shot on the need to stop using FUD and start making better preparations to protect critical infrastructure.

snow globe security

Increased cyber awareness must lead to equivalent action

Recent ransomware attacks underscore the importance of a unified global response.

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

Davis-Besse Power Station in Oak Harbor, Ohio

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best.

woman shouting into bullhorn

Who cares about smart city security?

There is a fierce debate raging over smart city security, with one side fueling the hype while the other conjures nightmare scenarios. The trouble is that the debate is silent, siloed and unproductive.

coal power station

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

Load More