Best practices for securing critical and public infrastructure

Best practices for securing critical and public infrastructure

The United States government defines the “critical infrastructure” as 16 specific sectors considered so vital to the U.S. that their incapacitation or destruction would have a debilitating effect on security, national economic security and national public health and/or safety. The “public infrastructure” is a subset of the critical infrastructure and includes roads, bridges, public transportation and airports, drinking water and wastewater treatment systems, solid waste services and facilities, and other important utilities essential to communities…

Read More

Automating a more resilient supply chain

Automating a more resilient supply chain

As technology evolves, manufactures can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction. Emerging technologies such as Internet of Things (IoT) and artificial intelligence (AI) can increase efficiencies for manufactures. At the same time, this increase in technology may create openings for cyberattacks on the supply chain as well as critical infrastructure.  Here, we talk with Scott Reynolds, the President-Elect at International Society of Automation.  Security magazine: Tell us about your title…

Read More

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

The telecommunications industry underpins global communication and powers our digital world. Cybercriminals, however, have also become increasingly sophisticated in the threats they pose against such critical infrastructure. Recent developments, like the Federal Communications Commission’s (FCC) 7-day rule mandating that telecom providers report data breaches within seven days after initial discovery, underscore the growing urgency to fortify cybersecurity measures across this vital sector. Research from Sysdig’s Threat Research Team revealed the telecom industry was the most…

Read More

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The evolving cyber threat landscape

The evolving cyber threat landscape

The evolving cyber threat landscape | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography   | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Duncan Greatwood — Securing remote access in critical infrastructure

5 minutes with Duncan Greatwood — Securing remote access in critical infrastructure

5 minutes with Duncan Greatwood — Securing remote access in critical infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

US critical infrastructure, airports targeted by pro-Russia hackers

US critical infrastructure, airports targeted by pro-Russia hackers

US critical infrastructure, airports targeted by pro-Russia hackers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

A case for market-driven cybersecurity in critical infrastructure

A case for market-driven cybersecurity in critical infrastructure

A case for market-driven cybersecurity in critical infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2