Remove Authentication Remove Cyber Insurance Remove Energy and Utilities
article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many. Despite these challenges, only half of leaders (51%) currently have security precautions like Multi-Factor Authentication in place, to combat against these human challenges.

article thumbnail

What we’ve learned from the Colonial Pipeline cyberattack, and what to do about it

SC Magazine

This gives attackers opportunities to sneak through cyber defenses, as we saw in the Oldsmar attack. Energy companies are especially at risk. Claroty researchers have found that energy companies are one of the most highly impacted by ICS vulnerabilities. Implement strong authentication for all OT users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing the Clean Energy Cyber Supply Chain: U.S. DOE's New Framework

SecureWorld News

Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER) has taken a significant step forward in bolstering the cybersecurity of America's energy sector. Implement Strong Access Controls: Utilize multi-factor authentication and least privilege principles.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Sectors like energy, healthcare, transportation, utilities, and financial systems are increasingly at risk because they are integral to national security and daily life. Cyber Insurance Cyber insurance will become an essential component of risk management strategies.

article thumbnail

LW ROUNDTABLE: Lessons learned from the headline-grabbing cybersecurity incidents of 2024

The Last Watchdog

Cunningham John Paul Cunningham , CISO, Silverfort Identity-based attacks in 2024, like those on Microsoft and Snowflake, are prompting insurers to intensify scrutiny in 2025. Our research reveals 69% of breaches are rooted in inadequate authentication and 78% of organizations have been targeted by identity-based attacks.