Best practices for securing critical and public infrastructure

Best practices for securing critical and public infrastructure

The United States government defines the “critical infrastructure” as 16 specific sectors considered so vital to the U.S. that their incapacitation or destruction would have a debilitating effect on security, national economic security and national public health and/or safety. The “public infrastructure” is a subset of the critical infrastructure and includes roads, bridges, public transportation and airports, drinking water and wastewater treatment systems, solid waste services and facilities, and other important utilities essential to communities…

Read More

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

The telecommunications industry underpins global communication and powers our digital world. Cybercriminals, however, have also become increasingly sophisticated in the threats they pose against such critical infrastructure. Recent developments, like the Federal Communications Commission’s (FCC) 7-day rule mandating that telecom providers report data breaches within seven days after initial discovery, underscore the growing urgency to fortify cybersecurity measures across this vital sector. Research from Sysdig’s Threat Research Team revealed the telecom industry was the most…

Read More

Using SD-WAN for securing distributed renewable energy

Using SD-WAN for securing distributed renewable energy

Renewable energy is a rapidly growing segment of the energy industry. Technologies such as wind, solar, biomass, geothermal, and energy storage are now considered mainstream. However, all of these sites require secure connectivity to enable important remote monitoring and control. Renewable energy companies must connect an array of renewable energy assets spread across wide geographic areas. Many renewable asset operators also use public and private cloud-based applications, including SCADA. They need a network architecture that…

Read More

Securing the power grid: Are you ready for NERC CIP’s upcoming mandate?

Securing the power grid: Are you ready for NERC CIP’s upcoming mandate?

A defense-in-depth strategy is one that protects organizations from attacks that bypass the first layer of security controls. It is a well understood concept, and one that has been adopted by most organizations over the years. However, until recently, the North American Electric Reliability Corporation (NERC) presented a gap where regulation required securing the electronic security perimeter (ESP), but there were no further security controls beyond the network perimeter. If utilities followed NERC CIP, and…

Read More

Leveraging a digital twin with machine learning to revitalize bridges

Leveraging a digital twin with machine learning to revitalize bridges

As you drive across a bridge you might think of the impact it’s having on your commute, but have you ever considered the impact you’re having on the bridge itself? Until recently, this impact was largely left to projections based on historical engineering practices, rather than real-time data. In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology…

Read More

Cyber Security Trends to Watch in Australia in 2024

Cyber Security Trends to Watch in Australia in 2024

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors. The year 2023 was a big year for cyber security professionals in Australia. While IT teams continued to deal with the fallout of some big Australian data breaches, the new 2023-2030 Australian Cyber Security Strategy was released to boost defences against future threats. Experts…

Read More

Keeping the lights on: Brazilian power utility wins cybersecurity award for securing grid network with Cisco

Keeping the lights on: Brazilian power utility wins cybersecurity award for securing grid network with Cisco

Cyberattacks on electric power utilities are on the rise. From 2020 to 2022, weekly attacks more than doubled. An attack that exploits a vulnerability in intelligent electronic devices (IEDs) like power distribution units, relay, and circuit breakers can turn off the lights in a neighborhood or entire city. On the surface, it seems simple enough to remediate vulnerabilities as soon as they’re reported—for example, by upgrading firmware. Fact is, detecting and remediating vulnerabilities in operational…

Read More

IoT Transportation Leadership Summit: Innovation on the Move

IoT Transportation Leadership Summit: Innovation on the Move

Across the United States, local communities, transportation departments, and transit, port, and turnpike authorities are seeking new and better ways to deliver on their mission-critical objectives to provide safe, efficient, and reliable transportation. They are focusing on smart, long-term investments in digital infrastructure to support the future needs of transportation. At Cisco Live US earlier this year, we hosted an industrial IoT Transportation Leadership Summit, inviting industry leaders to discuss their plans, progress, and the…

Read More

Building Resilience & Increasing Your Value to the Organization

Building Resilience & Increasing Your Value to the Organization

Building Resilience & Increasing Your Value to the Organization | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3 9