opinionLegacy systems are the Achilles’ heel of critical infrastructure cybersecurityChina and other nation-state bad actors are probing the defenses of critical infrastructure worldwide and legacy or outdated systems are prime targets. The time to mitigate that risk is now.By Christopher BurgessJul 08, 20248 minsThreat and Vulnerability ManagementCritical InfrastructureSecurity Practices feature Hijack of monitoring devices highlights cyber threat to solar power infrastructureBy Cynthia BrumfieldMay 23, 20249 minsEnergy IndustryUtilities IndustryCritical Infrastructurenews analysis Biden delivers updated take on security for critical infrastructure By Cynthia BrumfieldMay 02, 20248 minsGovernmentThreat and Vulnerability ManagementCritical Infrastructure featureTop 10 physical security considerations for CISOsBy Ericka Chickowski Apr 23, 202414 minsCritical InfrastructureSecurity InfrastructureSecurity news analysisSiemens, other vendors patch critical ICS product vulnerabilitiesBy Lucian Constantin Mar 20, 20244 minsCritical InfrastructureVulnerabilities opinion5 ways private organizations can lead public-private cybersecurity partnershipsBy Christopher Whyte Mar 20, 202413 minsCSO and CISOCritical Infrastructure news analysisChinese espionage a prime concern for connected vehiclesBy Cynthia Brumfield Mar 12, 20249 minsAdvanced Persistent ThreatsGovernmentCritical Infrastructure news analysisInternational warning: Attackers could gain persistence on Ivanti VPN appliances By Lucian Constantin Mar 01, 20247 minsAdvanced Persistent ThreatsCritical InfrastructureVulnerabilities news analysisThree new advanced threat groups targeted industrial organizations last yearBy Lucian Constantin Feb 28, 20247 minsAdvanced Persistent ThreatsThreat and Vulnerability ManagementCritical Infrastructure Articlesnews analysisBiden order bars data broker sale of Americans’ sensitive data to adversariesPresident Biden issued an executive order to bar data brokers from selling American’s sensitive data to “countries of concern,” ordering a slew of actions by the Justice Department and other government agencies that would deny adversaries access to the highly prized information.By Cynthia Brumfield Feb 28, 2024 10 minsGovernmentData PrivacyCritical InfrastructurefeatureRussia's use of malware to enhance election influence operations sign of things to comeNew research shows that Russia used click-fraud malware to enhance the visibility of its troll farm content in the 2016 US presidential campaign, and the practice likely continues in this big election year globally.By Christopher Whyte Feb 28, 2024 11 minsAdvanced Persistent ThreatsElection HackingMalwarenews analysisNIST releases expanded 2.0 version of the Cybersecurity FrameworkThe US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.By Cynthia Brumfield Feb 27, 2024 6 minsIT Governance FrameworksSupply ChainCritical Infrastructurenews analysisBiden's maritime cybersecurity actions target China threatsThe White House announced a new executive order and other actions to strengthen the cybersecurity of the maritime industry and ports while seeking to revive a domestic crane industry and wean America off Chinese-made port cranes.By Cynthia Brumfield Feb 22, 2024 9 minsAdvanced Persistent ThreatsGovernmentCritical InfrastructureopinionCritical infrastructure attacks aren't all the same: Why it matters to CISOsRecent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.By Christopher Whyte Feb 22, 2024 12 minsAdvanced Persistent ThreatsCritical Infrastructurenews analysisLawmakers see power grid security risks from Chinese storage batteriesLawmakers and experts fear that the use of Chinese storage batteries could threaten the power grid, but few alternatives are in the offing, at least in the short term.By Cynthia Brumfield Feb 16, 2024 11 minsAdvanced Persistent ThreatsGovernmentCritical InfrastructureopinionA changing world requires CISOs to rethink cyber preparednessCISOs should consider a more values-oriented, socially informed approach to cyber risk as global conflict grows and many governments could change in key elections.By Christopher Whyte Feb 13, 2024 12 minsCSO and CISOCritical InfrastructureRisk ManagementnewsCISA takes on US state election security issues, deploys inspectorsRegional inspectors will help bolster US election security ahead of 2024 presidential voting.By Jon Gold Feb 09, 2024 3 minsElection HackingGovernmentCritical InfrastructureopinionDefend critical infrastructure from cyber threats like the US Navy protects ships Smart cities, power grids, and other distributed critical infrastructure could learn from how the US Navy protects the mission-readiness of its deployed fleet.By Tracy Gregorio Jan 25, 2024 6 minsThreat and Vulnerability ManagementCritical InfrastructurefeatureCivilian cyber reserves gaining steam at the US federal and state levelsVolunteer cybersecurity reserve workforces are growing in the face of infosec worker shortages, with US CyberCommand recently authorized in the 2024 NDAA to create its own civilian cybersecurity reserve corps.By Cynthia Brumfield Jan 24, 2024 7 minsGovernmentCritical InfrastructureCareersnews analysisMonths long AsyncRAT campaign targeted key US infrastructure employeesAttackers used more than 300 samples of the malicious tool and more than 100 domains to evade detection.By Lucian Constantin Jan 09, 2024 5 minsAdvanced Persistent ThreatsCyberattacksMalwarenewsAustralian government opens consultation on mandatory ransomware reporting obligationConsultation proposes new cybersecurity legislation for IoT devices, ransomware reporting and amendments to the Security of Critical Infrastructure Act 2018.By Samira Sarraf Dec 20, 2023 9 minsGovernment ITRansomwareCritical Infrastructure Show more Show less View all Resources whitepaper MODERNIZATION WHITE PAPER A Five-Step Blueprint for Decision-Makers The post MODERNIZATION WHITE PAPER appeared first on Whitepaper Repository –. By Vaadin 16 May 2024Application Performance ManagementBusiness OperationsCritical Infrastructure whitepaper MODERNIZATION WHITE PAPER By Vaadin 16 May 2024Application Performance ManagementBusiness OperationsCritical Infrastructure View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. May 12, 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 Jan 15, 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO