Critical Infrastructure

Critical Infrastructure | News, how-tos, features, reviews, and videos

binary neural network - artificial intelligence - machine learning

Balancing cybersecurity and regulatory compliance

Leveraging artificial intelligence and other advancements is key to protecting critical infrastructure.

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

balint seeber bastille SirenJack

SirenJack: Hackers can hijack emergency alert sirens with a $35 radio and laptop

Emergency alert systems manufactured by Acoustic Technology Inc. can be hijacked and made to play any audio thanks to a vulnerability dubbed SirenJack.

electricity coal power

Combating cyber threats in critical infrastructure through due diligence

Regardless of the implementation method, it’s important for critical infrastructure industries to assess their cybersecurity risks and to protect themselves. An optimal way to start is to adopt the NIST CSF, which will bring depth and...

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

industrial refinery energy plant oil gas

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

cyberwarfare defense illustration

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

lighthouse beam beckons to a businessman in a boat on a sea of red tape

What happens if... disaster recovery for the smart city and beyond

Using disaster-recovery-as-a-service (DRaaS) for smart distributed data.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

salted hash cms hero th3

Salted Hash Ep 14: Are mass transit systems the next big target?

This week Salted Hash talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

IBM, blockchain, Maersk

Defeating 21st Century pirates: the maritime industry and cyberattacks

An increasingly digitized maritime industry needs to keep up with cybersecurity.

padlock with circuitry lock in secure

Protecting business assets

Identifying business assets and connecting your security program to them.

quell cyber attacks primary

Cyber resiliency – a key to corporate survival (and sleep)

The recent major cybersecurity events – including WannaCry, NotPetya, and most recently, the Equifax data breach – underscore the need for organizations to be able to respond quickly to incidents (in some cases multiple incidents at...

hacker hacked power grid

Hackers gain access to switch off the power in America and Europe

A new Symantec report claims sophisticated hackers have gained sabotage-level access to energy firms in the U.S. and could flip off the power at will.

cyberwarfare defense illustration

Drop a pre-emptive cyber bomb on North Korea?

Cyberwarfare experts share opinions on how to deal with the North Korean cyber threat.

coal power station

Engineering firm exposes SCIF plans and power vulnerability reports

Chris Vickery, director of cyber risk research at UpGuard, Inc., says that a misconfigured Rsync server maintained by Power Quality Engineering, Inc. (PQE) exposed client information pertaining to critical infrastructure for the City...

industrial iot

10 emerging ICS and IIoT cybersecurity companies to watch

Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.

Load More