<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Infrastructure:Electric,Gas &amp; Water</title>
    <description>
      <![CDATA[From terrorism to vandalism, it's preparedness, response, training and partnerships.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2238</link>
    <language>en-us</language>
    <item>
      <title>Nuclear Facility Cyberattack Investigated as Possible Iranian Exploit</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Poland’s National Centre for Nuclear Research defended against a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102170</guid>
      <pubDate>Thu, 12 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102170-nuclear-facility-cyberattack-investigated-as-possible-iranian-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/Nuclear-power-plant-by-Luk-Lehotsk.webp?t=1773323465" type="image/png" length="414474"/>
    </item>
    <item>
      <title>Grid Protection in Severe Weather: What Security Leaders Need to Know </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Malicious cyber actors may take advantage of weather crises.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102096</guid>
      <pubDate>Mon, 26 Jan 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102096-grid-protection-in-severe-weather-what-security-leaders-need-to-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/City-in-winter-by-James-Lewis.webp?t=1769626263" type="image/png" length="696652"/>
    </item>
    <item>
      <title>High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management</title>
      <description>
        <![CDATA[<p>Breaking down protection guidance for the water and wastewater industry.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102018</guid>
      <pubDate>Fri, 28 Nov 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102018-high-water-mark-cisa-shares-foundations-for-effective-cybersecurity-and-risk-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/21/Water-faucet-and-cup-by-LuAnn-Hunt.webp?t=1764812377" type="image/png" length="371076"/>
    </item>
    <item>
      <title>From Farm to Table: Securing the Future of Agriculture with Innovative Technology</title>
      <description>
        <![CDATA[<p>A look at the critical role security plays in keeping today’s agriculture industry strong.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101946</guid>
      <pubDate>Fri, 10 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101946-from-farm-to-table-securing-the-future-of-agriculture-with-innovative-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-F4-Feat-Slide1-1170x658.webp?t=1761294785" type="image/jpeg" length="233158"/>
    </item>
    <item>
      <title>Iran’s Cyber Playbook: What US Critical Infrastructure Needs to Be Doing Right Now</title>
      <description>
        <![CDATA[<p>For security leaders across U.S. critical national infrastructure, the question isn’t if they’re in the crosshairs. It’s how ready they are when, not if, the next attack hits.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101798</guid>
      <pubDate>Tue, 05 Aug 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101798-irans-cyber-playbook-what-us-critical-infrastructure-needs-to-be-doing-right-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/29/Power-lines-by-Yuan-Yang.webp?t=1753805405" type="image/png" length="497945"/>
    </item>
    <item>
      <title>Hacktivism Increasingly Targeting Critical Infrastructure</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Hacktivists are increasingly targeting critical infrastructure.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101769</guid>
      <pubDate>Thu, 17 Jul 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101769-hacktivism-increasingly-targeting-critical-infrastructure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/16/Pumpjack-at-sunset-by-Zbynek-Burival.webp?t=1752678483" type="image/png" length="195131"/>
    </item>
    <item>
      <title>Physical Security Measures That Respect Constitutional Rights</title>
      <description>
        <![CDATA[<p>Learn how organizations can protect premises without overstepping legal boundaries — ensuring security while upholding constitutional rights.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101750</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101750-physical-security-measures-that-respect-constitutional-rights</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-F2-Feat-Slide1-1170x658.webp?t=1752147913" type="image/jpeg" length="124308"/>
    </item>
    <item>
      <title>The importance of security for power utility substations</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security </em>magazine talks with Kaitlyn Albertoli, CEO of Buzz Solutions, about the importance of security for power utility substations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101487</guid>
      <pubDate>Mon, 24 Mar 2025 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101487-the-importance-of-security-for-power-utility-substations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/03/20/SEC_Web_5Minutes-Albertoli-0325_1170x658.webp?t=1743174050" type="image/jpeg" length="104667"/>
    </item>
    <item>
      <title>Chinese threat actor resided in US electric grid for almost one year</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A case study discusses an intrusion into the United States electric grid associated with Volt Typhoon, a Chinese threat actor. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101469</guid>
      <pubDate>Mon, 17 Mar 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101469-chinese-threat-actor-resided-in-us-electric-grid-for-almost-one-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/03/14/Power-lines-by-Yuan-Yang.webp?t=1741964535" type="image/png" length="497945"/>
    </item>
    <item>
      <title>US experiences 47% of global utilities cyberattacks</title>
      <author></author>
      <description>
        <![CDATA[<p>A new report indicates a rise in cyberattacks against the utilities sector. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101312</guid>
      <pubDate>Wed, 22 Jan 2025 11:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101312-us-experiences-47-of-global-utilities-cyberattacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/01/21/Solar-panels-by-Zbynek-Burival.webp?t=1737477061" type="image/png" length="561825"/>
    </item>
    <item>
      <title>Internet-exposed HMIs are a risk to water facilities, CISA warns</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Water and wastewater system facilities have been urged to secure internet-exposed human-machine interfaces (HMIs).</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101264</guid>
      <pubDate>Thu, 19 Dec 2024 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101264-internet-exposed-hmis-are-a-risk-to-water-facilities-cisa-warns</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/12/18/Water-faucet-and-cup-by-LuAnn-Hunt.webp?t=1734539998" type="image/png" length="371076"/>
    </item>
    <item>
      <title>Software and IT vendors linked to 67% of energy sector breaches </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101160</guid>
      <pubDate>Wed, 30 Oct 2024 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101160-software-and-it-vendors-linked-to-67-of-energy-sector-breaches</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/29/Utility-lines-in-sunset-UNSPLASH.webp?t=1730494641" type="image/png" length="433827"/>
    </item>
    <item>
      <title>Iranian cyber actors are targeting critical infrastructure entities</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Iranian cyber actors are targeting critical infrastructure entities via brute force.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101146</guid>
      <pubDate>Tue, 22 Oct 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101146-iranian-cyber-actors-are-targeting-critical-infrastructure-entities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/21/Computer-screen-with-coding-in-colored-text-UNSPLASH.webp?t=1729524584" type="image/png" length="778913"/>
    </item>
    <item>
      <title>Security experts discuss the American Water cyberattack</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>On Thursday, October 3, 2024, American Water discovered unauthorized activity in its systems. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101117</guid>
      <pubDate>Wed, 09 Oct 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101117-security-experts-discuss-the-american-water-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/08/Bottles-of-water-UNSPLASH.webp?t=1728397666" type="image/png" length="470408"/>
    </item>
    <item>
      <title>80% of critical infrastructure entities affected by email breaches </title>
      <author></author>
      <description>
        <![CDATA[<p>New research discusses the state of email security amongst critical infrastructure organizations. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100713</guid>
      <pubDate>Tue, 17 Sep 2024 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100713-80-of-critical-infrastructure-entities-affected-by-email-breaches</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/29/Rows-of-pipes-upheld-by-metal-foundation-UNSPLASH.webp?t=1716991454" type="image/png" length="476554"/>
    </item>
    <item>
      <title>Jeremy Rodrigues | Most Influential People in Security</title>
      <description>
        <![CDATA[<p>Jeremy Rodrigues discusses the importance of mentorship and his career throughout the public and private sector of the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100962</guid>
      <pubDate>Thu, 05 Sep 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100962-jeremy-rodrigues-most-influential-people-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/09-September/SEC-0924-MIPS-Rod-Feat-Slide1-1170x658.webp?t=1724176397" type="image/jpeg" length="79593"/>
    </item>
    <item>
      <title>Cyberattacks on critical infrastructure increased by 30% in one year</title>
      <author></author>
      <description>
        <![CDATA[<p>A new report highlights the rising threat of cyber incidents against critical infrastructure. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100982</guid>
      <pubDate>Tue, 27 Aug 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100982-cyberattacks-on-critical-infrastructure-increased-by-30-in-one-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/08/26/Utility-lines-in-sunset-UNSPLASH.webp?t=1724696368" type="image/png" length="433827"/>
    </item>
    <item>
      <title>Security leaders respond to the Halliburton cyberattack</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Halliburton, one of the most prominent oilfield service companies, was the subject of a recent cyberattack.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100980</guid>
      <pubDate>Tue, 27 Aug 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100980-security-leaders-respond-to-the-halliburton-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/08/26/Rows-of-pipes-upheld-by-metal-foundation-UNSPLASH.webp?t=1724685402" type="image/png" length="476554"/>
    </item>
    <item>
      <title>Malware campaign targets Spanish-speaking individuals </title>
      <author></author>
      <description>
        <![CDATA[<p>A new malware campaign targets Spanish-speaking individuals within the mining sector. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100843</guid>
      <pubDate>Wed, 10 Jul 2024 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100843-malware-campaign-targets-spanish-speaking-individuals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/07/09/Paper-speech-bubble-UNSPLASH.webp?t=1720539893" type="image/png" length="414041"/>
    </item>
    <item>
      <title>Untrained users are the greatest weakness in a cyber defense plan</title>
      <author></author>
      <description>
        <![CDATA[<p>A new report measures the likelihood that an organization’s employees would fall for a phishing or social engineering scam. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100781</guid>
      <pubDate>Wed, 12 Jun 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100781-untrained-users-are-the-greatest-weakness-in-a-cyber-defense-plan</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/06/11/Two-people-working-at-laptops-with-documents-UNSPLASH.webp?t=1718113500" type="image/png" length="507637"/>
    </item>
    <item>
      <title>2024: The year of upticks in cyber warfare</title>
      <description>
        <![CDATA[<p>Historical trends over the past decade prove that when global conflicts arise, cyberattacks will follow. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/100777</guid>
      <pubDate>Tue, 11 Jun 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/100777-2024-the-year-of-upticks-in-cyber-warfare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/06/10/The-Earth-UNSPLASH.webp?t=1718027212" type="image/png" length="335989"/>
    </item>
    <item>
      <title>97% of security experts worry about AI-related security incidents</title>
      <author></author>
      <description>
        <![CDATA[<p>A new report highlights trends in AI-powered attacks and cybersecurity strategies. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100751</guid>
      <pubDate>Thu, 06 Jun 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100751-97-of-security-experts-worry-about-ai-related-security-incidents</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/30/boicu-andrei-YtDIYzUAG9Q-unsplash.webp?t=1706627086" type="image/jpeg" length="108923"/>
    </item>
    <item>
      <title>Securing critical infrastructure</title>
      <description>
        <![CDATA[<p>Critical infrastructure must not only guard against intrusions from organized groups but also unintentional vulnerabilities introduced by employees.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100703</guid>
      <pubDate>Fri, 24 May 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100703-securing-critical-infrastructure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/23/chris-briggs-ZjmKvH9pBrM-unsplash.webp?t=1716646762" type="image/jpeg" length="88713"/>
    </item>
    <item>
      <title>EPA reveals most water systems do not meet compliance requirements</title>
      <author></author>
      <description>
        <![CDATA[<p>An investigation by the EPA reveals that a majority of water systems do not meet compliance standards. Security leaders are sharing their thoughts. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100694</guid>
      <pubDate>Thu, 23 May 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100694-epa-reveals-most-water-systems-do-not-meet-compliance-requirements</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/22/Bottles-of-water-UNSPLASH.webp?t=1716389124" type="image/png" length="470408"/>
    </item>
    <item>
      <title>Best practices for securing critical and public infrastructure</title>
      <description>
        <![CDATA[<p>Entities supporting critical infrastructure components must implement a comprehensive set of physical and technical tools and practices.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100660</guid>
      <pubDate>Tue, 14 May 2024 14:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100660-best-practices-for-securing-critical-and-public-infrastructure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/13/Inside-of-water-disposal-pipe-UNSPLASH.webp?t=1715610328" type="image/png" length="530661"/>
    </item>
    <item>
      <title>Segmentation, data diodes and NSA’s zero trust guidance </title>
      <description>
        <![CDATA[<p>While the NSA’s guidance on fortifying the network and environment pillar of Zero Trust through segmentation is impactful, many organizations still have a demand for connectivity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100651</guid>
      <pubDate>Mon, 13 May 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100651-segmentation-data-diodes-and-nsas-zero-trust-guidance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/10/Network-of-cables-UNSPLASH.webp?t=1715350700" type="image/png" length="710415"/>
    </item>
    <item>
      <title>66% of IT leaders doubt the government can defend against cyberwarfare</title>
      <author></author>
      <description>
        <![CDATA[<p>In a recent report, two-thirds of IT leaders express a lack of confidence in the United States government's ability to defend against cyberwarfare.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100593</guid>
      <pubDate>Fri, 19 Apr 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100593-66-of-it-leaders-doubt-the-government-can-defend-against-cyberwarfare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/18/Three-people-fighting-for-envelope-UNSPLASH.webp?t=1713453081" type="image/png" length="512924"/>
    </item>
    <item>
      <title>An ally for organizations navigating the complex cyber terrain</title>
      <description>
        <![CDATA[<p>The evolution of the NIST Cybersecurity Framework in its 2.0 iteration underscores a significant paradigm shift towards a governance-focused approach.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100576</guid>
      <pubDate>Fri, 05 Apr 2024 08:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100576-an-ally-for-organizations-navigating-the-complex-cyber-terrain</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/04/sigmund-59yRYIHWtzY-unsplash-(1).webp?t=1712377713" type="image/jpeg" length="72299"/>
    </item>
    <item>
      <title>Critical infrastructure may be the subject of disruptive cyberattacks</title>
      <author></author>
      <description>
        <![CDATA[<p>The White House has stated that critical infrastructure may be targeted by malicious actors, and security leaders are sharing their insights on the situation. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100543</guid>
      <pubDate>Wed, 27 Mar 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100543-critical-infrastructure-may-be-the-subject-of-disruptive-cyberattacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/03/26/Inside-of-water-disposal-pipe-UNSPLASH.webp?t=1711459914" type="image/png" length="530661"/>
    </item>
    <item>
      <title>Report provides key insights into the energy and utilities sector</title>
      <author></author>
      <description>
        <![CDATA[<p>A survey of more than 1,000 security professionals worldwide has been conducted to gain valuable insights into the energy and utilities sector. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100471</guid>
      <pubDate>Mon, 04 Mar 2024 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100471-report-provides-key-insights-into-the-energy-and-utilities-sector</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/03/01/Rows-of-pipes-upheld-by-metal-foundation-UNSPLASH.webp?t=1709306144" type="image/png" length="476554"/>
    </item>
  </channel>
</rss>
