Critical Infrastructure

Critical Infrastructure | News, how-tos, features, reviews, and videos

shutterstock tractor technology
Industry 4.0 / Industrial IoT / Smart Factory / robotics / automation

wireless network - industrial internet of things edge [IoT] - edge computing

MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats

The latest version of the MITRE ATT&CK Framework addresses two of the most pressing threat-actor targets: mobile devices and industrial control systems.

hacking critical infrastructure security

After foiled Sandworm attack, US critical infrastructure should stand guard

Russian attack on Ukrainian power company likely just the beginning.

industrial power plant hacked skull and crossbone pixels security breach power plant by jason black

Rare and dangerous Incontroller malware targets ICS operations

A coalition of U.S. government agencies, security researchers, and companies warn about this new malware that can gain complete access to ICS and SCADA systems.

Toy soldiers + binary code / wargames / cyberwarfare

Ukraine energy facility hit by two waves of cyberattacks from Russia’s Sandworm group

Sandworm succeeded in planting a new version of the Industroyer malware to disrupt ICS infrastructure at multiple levels, but was thwarted from doing serious damage.

power plant utilities energy innovation industrial iot american public power association unsplash

CISA, FBI, DOE issue cybersecurity advisory on Russian attacks against global energy sector

The advisory outlines two intrusion campaigns against U.S. and international energy sector organizations and warns of persistent threats posed by Russian cyber operations.

industrial power plant hacked skull and crossbone pixels security breach power plant by jason black

US charges Russian government agents for cyberattacks on critical infrastructure

Two sets of attacks used Triton and Havex malware to infiltrate industrial control systems at energy organizations in the US and abroad.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars

States step up cybersecurity efforts as threats increase

Spurred by recent attacks, some U.S. states are taking action and allocating funds to boost their defenses against cyber threats.

wind turbines energy utilities innovation alternative energy by anna jimenez calaf unsplash

Fortress creates center for security information on energy suppliers

Vendor library offers means to bolster supply-chain security through data sharing and communication.

United States Capitol building / United States Congress / abstract security concept

Cyber incident reporting measures approved in the omnibus spending bill

Critical infrastructure entities and federal agencies will have to report significant cyber incidents to CISA within 72 hours and ransomware attacks within 24 hours under legislation passed by the House that will likely become law.

hacking critical infrastructure security

Ransomware is top attack vector on critical infrastructure

An annual review from Dragos finds much improvement needed to protect industrial systems. More regulation is possible if they don't.

Binary Russian flag

Russia’s offensive cyber actions should be a cause for concern for CISOs

Recent cyber attacks against Western entities operating in Ukraine aim to disrupt or conduct espionage. CISOs should be wary of such attacks expanding beyond the Ukrainian border.

Deborah Wheeler, CISO, Delta Air Lines

Delta CISO Debbie Wheeler: Security can’t be seen as a competitive advantage

With the complexity and criticality of security in the aviation industry, Wheeler warns against viewing security as a competitive advantage. Instead, she says, a more collaborative approach is required.

United States map consisting of encrypted data and binary code.

DHS creates Cyber Safety Review Board to review significant cybersecurity incidents

The CSRB will advise the President and Department of Homeland Security director, as well as review major security events starting with the Log4j exploits.

3 the vertical market fintech stock market graph

SEC eyes more expansive cybersecurity requirements

New rules for publicly traded companies could add protections for consumer information, strengthen incident reporting, and require assessment of third-party risk.

USA / United States of America stars + stripes and binary code superimposed over The White House

Biden memo aims to bolster cybersecurity in national security systems

A national security memorandum places new cybersecurity requirements for reporting and preventing security incidents involving sensitive national security systems.

security command center monitors control center getty goro denkoff

U.S. Cyber Command’s actions against ransomware draw support and criticism

The actions, which temporarily took down REvil, raise questions about using the military to combat ransomware.

5G light trails

6 key points of the new CISA/NSA 5G cloud security guidance

The security guidance focuses on zero-trust concepts as the US agencies anticipate growth of 5G networks.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars

Pentagon announces version 2.0 of its controversial CMMC program

CMMC 2.0 simplifies the process for SMBs, but critics say the verification process relies too much on self-attestation.

Load More
You Might Also Like