Latest from todayfeatureWhy cyber attackers are targeting your solar energy systems — and how to stop themBusinesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.By Michael Nadeau03 Mar 202513 minsCritical InfrastructureSecurityUtilities Industry feature 8 biggest cybersecurity threats manufacturers faceBy John Leyden06 Dec 20249 minsCyberattacksManufacturing IndustryRansomwarefeature Russian group’s hack of Texas water system underscores critical OT cyber threatsBy Cynthia Brumfield21 Oct 202411 minsCritical InfrastructureCyberattacksGovernment IT newsChina-based cyber espionage campaign in SE Asia is expanding, says SophosBy Howard Solomon 10 Sep 20246 minsCritical InfrastructureCyberattacksGovernment newsUS charges 5 Russian spies for Ukraine, NATO cyberattacksBy Lucian Constantin 05 Sep 20247 minsCritical InfrastructureCyberattacksGovernment news analysisICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwideBy Lucian Constantin 23 Jul 20245 minsCritical InfrastructureMalwareNetwork Security featureInside the world’s largest ‘live-fire’ cyber-defense exerciseBy Mario Moreno 19 Jul 20247 minsCritical InfrastructureCyberattacksData and Information Security opinionLegacy systems are the Achilles’ heel of critical infrastructure cybersecurityBy Christopher Burgess 08 Jul 20248 minsCritical InfrastructureSecurity PracticesThreat and Vulnerability Management featureHijack of monitoring devices highlights cyber threat to solar power infrastructureBy Cynthia Brumfield 23 May 20249 minsCritical InfrastructureEnergy IndustryUtilities Industry Articlesnews analysisBiden delivers updated take on security for critical infrastructure Building on previous efforts, the Biden administration's new National Security Memorandum reflects a more modern approach to protecting US critical infrastructure, giving CISA a better-defined and expanded role as the agency coordinating everything.By Cynthia Brumfield 02 May 2024 8 minsCritical InfrastructureGovernmentThreat and Vulnerability ManagementfeatureTop 10 physical security considerations for CISOsSecuring premises and devices from physical attacks can be just as challenging as defending against cyber threats. Collaboration and communication with all teams involved is the key to success.By Ericka Chickowski 23 Apr 2024 14 minsCritical InfrastructureSecuritySecurity Infrastructurenews analysisSiemens, other vendors patch critical ICS product vulnerabilitiesSome of the flaws outlined in 15 advisories could result in remote code execution on industrial control systems.By Lucian Constantin 20 Mar 2024 4 minsCritical InfrastructureVulnerabilitiesopinion5 ways private organizations can lead public-private cybersecurity partnershipsPublic-private partnerships like the US Joint Cyber Defense Collaborative are often led by public agencies, but private-led cybersecurity partnerships might be more effective.By Christopher Whyte 20 Mar 2024 13 minsCSO and CISOCritical Infrastructurenews analysisChinese espionage a prime concern for connected vehiclesAs the Biden administration worries about China's role in the emerging connected vehicle market, experts point to the country's ability to engage in espionage as the biggest threat.By Cynthia Brumfield 12 Mar 2024 9 minsAdvanced Persistent ThreatsCritical InfrastructureGovernmentnews analysisInternational warning: Attackers could gain persistence on Ivanti VPN appliances Researchers identify methods that could allow attackers to bypass Ivanti integrity checks for recent attacks, perhaps surviving factory resets.By Lucian Constantin 01 Mar 2024 7 minsAdvanced Persistent ThreatsCritical InfrastructureVulnerabilitiesnews analysisThree new advanced threat groups targeted industrial organizations last yearThreat actors continue to target operational technology assets of industrial organizations, but the quality of vulnerability information and mitigation advice is lacking.By Lucian Constantin 28 Feb 2024 7 minsAdvanced Persistent ThreatsCritical InfrastructureThreat and Vulnerability Managementnews analysisBiden order bars data broker sale of Americans’ sensitive data to adversariesPresident Biden issued an executive order to bar data brokers from selling American’s sensitive data to “countries of concern,” ordering a slew of actions by the Justice Department and other government agencies that would deny adversaries access to the highly prized information.By Cynthia Brumfield 28 Feb 2024 10 minsCritical InfrastructureData PrivacyGovernmentfeatureRussia's use of malware to enhance election influence operations sign of things to comeNew research shows that Russia used click-fraud malware to enhance the visibility of its troll farm content in the 2016 US presidential campaign, and the practice likely continues in this big election year globally.By Christopher Whyte 28 Feb 2024 11 minsAdvanced Persistent ThreatsElection HackingMalwarenews analysisNIST releases expanded 2.0 version of the Cybersecurity FrameworkThe US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.By Cynthia Brumfield 27 Feb 2024 6 minsCritical InfrastructureIT Governance FrameworksSupply Chainnews analysisBiden's maritime cybersecurity actions target China threatsThe White House announced a new executive order and other actions to strengthen the cybersecurity of the maritime industry and ports while seeking to revive a domestic crane industry and wean America off Chinese-made port cranes.By Cynthia Brumfield 22 Feb 2024 9 minsAdvanced Persistent ThreatsCritical InfrastructureGovernmentopinionCritical infrastructure attacks aren't all the same: Why it matters to CISOsRecent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.By Christopher Whyte 22 Feb 2024 12 minsAdvanced Persistent ThreatsCritical Infrastructure Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsCritical InfrastructureCyberattacksRansomware Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrimeSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain