As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Increased reliance on automation and new technologies to assist with meter reading, leak detection and other operational goals have opened a host of attack surfaces. Given the ever-evolving and multi-faceted threat landscape, sharing and collaboration are essential to water and wastewater security and resilience.
Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
By understanding each of the bad actors, federal agencies, law enforcement and first responders — often victims of cyberhacktivism —can better prepare for, and prevent, cyberattacks from happening. Here are a few basic steps every public safety agency can take.
With duress technology literally at their fingertips, healthcare staff can request help anytime/anywhere in facilities and rest assured that assistance is on the way.
It’s difficult for security teams to get executive buy-in to address the problem because measuring and improving AD security is challenging. There are several reasons why.
Together, cyber and physical assets represent a significant amount of risk to physical security and cybersecurity — each can be targeted, separately or simultaneously, to result in compromised systems and infrastructure.
Given the rising attacks on critical infrastructure and the interconnected mesh of cyber-physical systems, the United States government is looking to better coordinate protection efforts that anticipate and counter criminal groups’ tactics, techniques and procedures, to help prevent attacks from reaching their intended targets.
To address the threat cybercriminals and foreign adversaries pose to DOD data, the department recently introduced the Cybersecurity Maturity Model Certification (CMMC). What is the CMMC, what does it consist of, and is it worth the expense?