feature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill05 Jun 20239 minsGovernmentCritical InfrastructureData and Information Security news analysis Federal cyber incidents reveal challenges of implementing US National Cybersecurity StrategyBy Cynthia Brumfield05 Jun 20237 minsGovernmentCyberattacksCritical Infrastructurenews analysis Researchers find new ICS malware toolkit designed to cause electric power outagesBy Lucian Constantin26 May 20236 minsAdvanced Persistent ThreatsMalwareCritical Infrastructure newsInsider threats surge across US CNI as attackers exploit human factorsBy Michael Hill 17 May 20234 minsThreat and Vulnerability ManagementCritical Infrastructure newsNozomi Networks announces Vantage IQ to address security gaps in critical infrastructureBy Michael Hill 16 May 20233 minsThreat and Vulnerability ManagementCritical Infrastructure newsIBM unveils end-to-end, quantum-safe tools to secure business, government dataBy Michael Hill 10 May 20234 minsEncryptionIBMQuantum Computing newsHow the Australian federal government will invest in cybersecurityBy Samira Sarraf 09 May 20235 minsSmall and Medium BusinessGovernmentCritical Infrastructure featureWhy Russia's cyber arms transfers are poor threat predictorsBy Christopher Whyte 27 Apr 202312 minsAdvanced Persistent ThreatsCritical Infrastructure newsAccenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructureBy Michael Hill 25 Apr 20233 minsGovernmentIncident ResponseRSA Conference ArticlesnewsOPSWAT mobile hardware offers infrastructure security for the air gapA new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.By Jon Gold 06 Feb 2023 3 minsCritical InfrastructureSecuritynews analysisMany ICS flaws remain unpatched as attacks against critical infrastructure riseMore than a third of ICS device vulnerabilities have no patch available at a time when ICS environments face threats from new cybercrime groups.By Lucian Constantin 19 Jan 2023 8 minsCritical InfrastructureVulnerabilitiesnews analysisNATO tests AI's ability to protect critical infrastructure against cyberattacksCybersecurity experts experiment with autonomous intelligence to secure and defend against increasing cyberthreats posed to critical infrastructure.By Michael Hill 05 Jan 2023 6 minsCritical InfrastructureArtificial Intelligencenews analysisUS Congress funds cybersecurity initiatives in FY2023 spending billThis year’s appropriation bill covers a lot of cybersecurity territory, including threats from TikTok and foreign adversaries and steps to improve medical device security.By Cynthia Brumfield 30 Dec 2022 6 minsGovernmentCritical Infrastructurenews analysisDozens of cybersecurity efforts included in this year's US NDAACybersecurity initiatives included in the US National Defense Authorization Act for 2023 include increased funding for Cybercom’s hunt-forward operations.By Cynthia Brumfield 15 Dec 2022 7 minsCSO and CISOGovernmentCritical Infrastructurenews analysisAre robots too insecure for lethal use by law enforcement?The San Francisco Police Department wants to use weaponized robots, but some experts say robots suffer from severe security flaws that render them too dangerous for such use.By Cynthia Brumfield 13 Dec 2022 8 minsCritical InfrastructureInternet of ThingsVulnerabilitiesopinionThe Biden administration has racked up a host of cybersecurity accomplishmentsThe Biden administration’s intense focus on cybersecurity has resulted in an unprecedented number of initiatives. Although domestic efforts seem well-baked, opportunities exist for further leadership in the international arena.By Cynthia Brumfield 23 Nov 2022 7 minsGovernmentComplianceCritical Infrastructurenews analysisCISA releases cybersecurity performance goals to reduce risk and impact of adversarial threatsBased on the NIST Cybersecurity Framework, the goals could become the baseline standards for cybersecurity negligence and possible future regulatory requirements.By Cynthia Brumfield 31 Oct 2022 7 minsComplianceCritical Infrastructurenews analysisResearchers extract master encryption key from Siemens PLCsGlobal encryption keys were hardcoded on some programmable logic controller product lines. Siemens recommends upgrading all affected devices.By Lucian Constantin 11 Oct 2022 6 minsCritical InfrastructureVulnerabilitiesnewsUK organizations, Ukraine’s allies warned of potential “massive” cyberattacks by RussiaUK National Cyber Security Centre CEO Lindy Cameron reflects on Russia’s recent cyber activity as Ukraine warns its allies to prepare for cyberattacks targeting critical infrastructure.By Michael Hill 28 Sep 2022 4 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructurenews analysisInternational cooperation is key to fighting threat actors and cybercrimeWestern intelligence and national security leaders emphasize the importance of collaborating to better prepare and respond to cybersecurity threats.By Cynthia Brumfield 19 Sep 2022 6 minsAdvanced Persistent ThreatsCritical Infrastructurenews analysisRagnar Locker continues trend of ransomware targeting energy sectorRansomware gangs seem to be exploiting concerns over disruptions in the energy and other critical infrastructure sectors.By Lucian Constantin 01 Sep 2022 5 minsRansomwareCritical Infrastructure Show more Show less View all Resources whitepaper The Top 10 Ways Storage is Changing This eBook outlines the top 10 ways businesses can ensure their infrastructure is making the most out of their data. The post The Top 10 Ways Storage is Changing appeared first on Whitepaper Repository. By Hitachi 08 Jun 2023Data ManagementInfrastructure ManagementIT Governance Frameworks whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime