Organizations are at risk of cyberattacks, as tensions with Russia rise.
Adopt a high posture when it comes to cybersecurity and protect the organization's most critical assets by following four steps.
As the likelihood of a Russian invasion grows, public and private sectors across the globe, specifically in the U.S. and Europe, should be on high alert for a wave of cyberattacks.
The Howard Bend Water Plant facility conducted a tabletop exercise, focused on incident information sharing procedures, and emergency response and recovery operations.
After several decades dedicated to safety and security, the Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania’s Division of Public Safety semi-retires, but first she shares what she’s learned.
After several decades dedicated to safety and security, the Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania’s Division of Public Safety semi-retires, but first she shares what she’s learned.
Oiltanking GmbH Group and Mabanaft Group— two companies involved in storing and supplying oil and other materials — have been hit by a cyberattack that has disrupted operations in Germany.
A new collaborative effort will focus on developing high-impact cybersecurity resilience strategies within 100 days to safeguard the water and wastewater sector.
One challenge for supply chain security practitioners is choosing which of the multitude of guidance documents and best practice frameworks to use when building a cyber supply chain risk management (C-SCRM) program. Let's explore each framework.
OT security and Industrial Control System Security (ICS), while improving, has not kept up with their evolving ecosystem, leaving systems exposed —
as seen by attacks on critical infrastructure.
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) are asking critical infrastructure network defenders to adopt a heightened state of awareness to mitigate attacks from Russian-state sponsored threat actors.