feature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill05 Jun 20239 minsGovernmentCritical InfrastructureData and Information Security news analysis Federal cyber incidents reveal challenges of implementing US National Cybersecurity StrategyBy Cynthia Brumfield05 Jun 20237 minsGovernmentCyberattacksCritical Infrastructurenews analysis Researchers find new ICS malware toolkit designed to cause electric power outagesBy Lucian Constantin26 May 20236 minsAdvanced Persistent ThreatsMalwareCritical Infrastructure newsInsider threats surge across US CNI as attackers exploit human factorsBy Michael Hill 17 May 20234 minsThreat and Vulnerability ManagementCritical Infrastructure newsNozomi Networks announces Vantage IQ to address security gaps in critical infrastructureBy Michael Hill 16 May 20233 minsThreat and Vulnerability ManagementCritical Infrastructure newsIBM unveils end-to-end, quantum-safe tools to secure business, government dataBy Michael Hill 10 May 20234 minsEncryptionIBMQuantum Computing featureWhy Russia's cyber arms transfers are poor threat predictorsBy Christopher Whyte 27 Apr 202312 minsAdvanced Persistent ThreatsCritical Infrastructure newsAccenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructureBy Michael Hill 25 Apr 20233 minsGovernmentIncident ResponseRSA Conference news analysisOT giants collaborate on ETHOS early threat and attack warning systemBy Cynthia Brumfield 24 Apr 20237 minsThreat and Vulnerability ManagementCritical InfrastructureRisk Management Articlesnews analysisWhite House releases an ambitious National Cybersecurity StrategyThe Biden administration's National Cybersecurity Strategy calls for more regulation on critical infrastructure providers and holds software providers accountable for their insecure products. By Cynthia Brumfield 02 Mar 2023 9 minsRegulationAdvanced Persistent ThreatsApplication SecurityopinionHow to de-risk your digital ecosystemDigital ecosystems are big, complicated, and a massive vector for exploits and attackers. Santha Subramoni, global head, cybersecurity business unit at Tata Consultancy Services discusses digital ecosystems security and how businesses can lower risk within their digital ecosystems.By Santha Subramoni 28 Feb 2023 10 minsInternet SecurityCritical InfrastructureData and Information Securitynews analysisAttacks on industrial infrastructure on the rise, defenses struggle to keep upA Dragos report shows threat actors new and old have the potential to cause major disruptions of critical infrastructure.By Lucian Constantin 14 Feb 2023 10 minsHacker GroupsMalwareCritical InfrastructurenewsOPSWAT mobile hardware offers infrastructure security for the air gapA new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.By Jon Gold 06 Feb 2023 3 minsCritical InfrastructureSecuritynews analysisMany ICS flaws remain unpatched as attacks against critical infrastructure riseMore than a third of ICS device vulnerabilities have no patch available at a time when ICS environments face threats from new cybercrime groups.By Lucian Constantin 19 Jan 2023 8 minsCritical InfrastructureVulnerabilitiesnews analysisNATO tests AI's ability to protect critical infrastructure against cyberattacksCybersecurity experts experiment with autonomous intelligence to secure and defend against increasing cyberthreats posed to critical infrastructure.By Michael Hill 05 Jan 2023 6 minsCritical InfrastructureArtificial Intelligencenews analysisUS Congress funds cybersecurity initiatives in FY2023 spending billThis year’s appropriation bill covers a lot of cybersecurity territory, including threats from TikTok and foreign adversaries and steps to improve medical device security.By Cynthia Brumfield 30 Dec 2022 6 minsGovernmentCritical Infrastructurenews analysisDozens of cybersecurity efforts included in this year's US NDAACybersecurity initiatives included in the US National Defense Authorization Act for 2023 include increased funding for Cybercom’s hunt-forward operations.By Cynthia Brumfield 15 Dec 2022 7 minsCSO and CISOGovernmentCritical Infrastructurenews analysisAre robots too insecure for lethal use by law enforcement?The San Francisco Police Department wants to use weaponized robots, but some experts say robots suffer from severe security flaws that render them too dangerous for such use.By Cynthia Brumfield 13 Dec 2022 8 minsCritical InfrastructureInternet of ThingsVulnerabilitiesopinionThe Biden administration has racked up a host of cybersecurity accomplishmentsThe Biden administration’s intense focus on cybersecurity has resulted in an unprecedented number of initiatives. Although domestic efforts seem well-baked, opportunities exist for further leadership in the international arena.By Cynthia Brumfield 23 Nov 2022 7 minsGovernmentComplianceCritical Infrastructurenews analysisCISA releases cybersecurity performance goals to reduce risk and impact of adversarial threatsBased on the NIST Cybersecurity Framework, the goals could become the baseline standards for cybersecurity negligence and possible future regulatory requirements.By Cynthia Brumfield 31 Oct 2022 7 minsComplianceCritical InfrastructurenewsUK businesses must do more to boost cyber defences, says Nadhim ZahawiThe Chancellor of the Duchy of Lancaster Nadhim Zahawi says that cybersecurity is key to the UK’s economic growth.By Michael Hill 19 Oct 2022 3 minsAdvanced Persistent ThreatsCritical Infrastructure Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime