This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The exponential growth of IoT devices in the energy and utilities industry has greatly increased the need to focus on cybersecurity. Without a doubt, one of the most game-changing innovations is the Internet of Things (IoT). Industry analyst firm IDC expects there will be over 41 billion connected IoT devices by 2025.
Several programmable logic controllers (PLCs) from Schneider Electric’s Modicon series that automate industrial processes in factories, energyutilities, HVAC systems and other installations are impacted by a flaw that could allow hackers to bypass their authentication mechanism and execute malicious code.
The attacks have been primarily targeting US and global organizations from a range of sectors including energy, financial, insurance, manufacturing, public utilities and retail. Sign up for CSO newsletters. ].
It is increasingly common to hear about cyber threats to energy and utility industries – our critical infrastructure. All too often it seems as though energy and utility companies are put in a defensive position to battle it out with these cyber intruders. To read this article in full, please click here
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. » For Hacking.
On that front, it was a wake-up call that spurred all kinds of activities, from cybersecurity sprints in the electric utility sector led by the Department of Energy to security directives from the TSA to pipeline, rail, and airport operators, to a new law establishing upcoming mandates for incident reporting."
Believed to have launched in December 2021, Ransom Cartel has made victims of organizations from among the education, manufacturing, utilities, and energy sectors with aggressive malware and tactics that resemble those used by REvil. To read this article in full, please click here
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). 5G, over time, will move everything to the edge – wherever an organization is defining its edge.
I am hoping we can continue to safely utilize tooling and AI to help bring people up to speed quickly, but at the same time, we need people to keep learning the foundations of how IT, networking, and development work, so they can use that knowledge to make confident and correct decisions.
Mind you, SolarWinds software is used to monitor network traffic by someone of the biggest names in the federal government (such as the Treasury department, the department of Commerce, department of Energy, NATO, and the European parliament). The worst is yet to come and 2021 might, unfortunately, see even bigger attacks realized.
Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services. He has also advised state and local government, utilities, large infrastructure and logistics organizations. Prior to IOOF, he has been security adviser for eight federal government departments.
In order to achieve Zero Trust, application security and API security can’t be left out of the equation; shares Richard Bird, CSO, of Traceable AI. Zero Trust without API security is simply, not Zero Trust. Encryption-in-use is one of the strongest and most effective guardrails that can be implemented toward zero-trust data security.”.
Sectors like energy, healthcare, transportation, utilities, and financial systems are increasingly at risk because they are integral to national security and daily life. Critical infrastructure face heightened risk from targeted disruptions, as do small businesses who are the backbone of the economy.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content