Critical Infrastructure

Critical Infrastructure | News, how-tos, features, reviews, and videos

medical network h/ ealthcare IoT / hospital connections and communications

Publicly known support credentials expose GE Healthcare imaging devices to hacking

The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Cybersecurity under fire: CISA’s former deputy director decries post-election vilification

Matt Travis talks about CISA's role in the recent US elections and how President Trump and his surrogates have politicized the security function.

Russian hammer and sickle / binary code

US DOJ indictments might force Russian hacker group Sandworm to retool

Experts hope that indictments against six Russian military intelligence agents will make Russia rethink plans to disrupt the US election.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Late-game election security: What to watch and watch out for

Despite disruption of the Trickbot botnet network, last-minute leaks of stolen documents and post-election undermining of trust in the election system remain big concerns.

Law enforcement coordination  >  A team of investigators collaborates. [detectives / FBI agents]

New FBI strategy seeks to disrupt threat actors, help defenders through better coordination

The FBI sharpens its focus on collaboration among US and foreign government agencies and the private sector. It will acting as a central hub to deal with cybersecurity threats.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Election security status: Some progress on ballot integrity, but not on Russian interference

With the election less than two months away, government and election officials say voting itself is more secure, but Russian disinformation remains largely unaddressed.

IDG Tech Spotlight  >  Edge Computing [ CSO / September 2020 ]

5 best practices for securing the edge

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

A virtual checkmark in digital system / standards / quality control / certification / certificates

CMMC bakes security into DoD’s supply chain, has value for all businesses

The Cybersecurity Maturity Model Certification provides a means for the DoD to certify the security capabilities of its contractors, but it's a good way to assess the cybersecurity maturity for all companies.

Official vote-by-mail ballot.

Security in the spotlight as the US heads into elections

A new report and tabletop exercise show how the upcoming US elections could be disrupted at the local government level without hacking the election itself.

United States Capitol building / United States Congress / abstract security concept

Many Cyberspace Solarium Commission recommendations expected to become federal law

Dozens of cybersecurity measures designed to protect US businesses and infrastructure are part of the National Defense Authorization Act. Budget, political concerns might eliminate some.

A pattern of Twitter-like bird icons and binary code is broken / breached / hacked.

Twitter hack raises alarm among government officials, security experts

The recent account takeover attack underscores how Twitter and other social platforms have become a critical component of political systems worldwide.

Election security / vulnerabilities / United States flag overlays voting ballot and unsecured lock

Time running out to protect US November elections

Experts say it's too late for significant legislative action to better protect voting this fall, but meaningful changes are still possible.

power plant utilities energy innovation industrial iot american public power association unsplash

New DOE document names China, Russia as threats to US bulk power system

A US Department of Energy RFI seeks information on energy industry's supply chain security practices following executive order to develop industry regulations.

A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.

USA / United States of America stars + stripes and binary code superimposed over The White House

Bipartisan bill could bring back the White House national cyber director role

Cyberspace Solarium Commission leaders introduce the National Cyber Director Act to reintroduce cybersecurity expertise into the White House.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.

iot security

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

Wireless telecommunications tower emanating concentric waves of transmission.

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

A report claims that oversight of Chinese telecoms for security threats to the US communications supply chain is lacking and without adequate authority.

Aerial view of the United States as a nationwide grid.

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

Load More
You Might Also Like