Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
By understanding each of the bad actors, federal agencies, law enforcement and first responders — often victims of cyberhacktivism —can better prepare for, and prevent, cyberattacks from happening. Here are a few basic steps every public safety agency can take.
With duress technology literally at their fingertips, healthcare staff can request help anytime/anywhere in facilities and rest assured that assistance is on the way.
It’s difficult for security teams to get executive buy-in to address the problem because measuring and improving AD security is challenging. There are several reasons why.
Together, cyber and physical assets represent a significant amount of risk to physical security and cybersecurity — each can be targeted, separately or simultaneously, to result in compromised systems and infrastructure.
Given the rising attacks on critical infrastructure and the interconnected mesh of cyber-physical systems, the United States government is looking to better coordinate protection efforts that anticipate and counter criminal groups’ tactics, techniques and procedures, to help prevent attacks from reaching their intended targets.
To address the threat cybercriminals and foreign adversaries pose to DOD data, the department recently introduced the Cybersecurity Maturity Model Certification (CMMC). What is the CMMC, what does it consist of, and is it worth the expense?
The critical infrastructure public and private sector can look to America’s electric companies for a holistic approach and partnership on supporting essential improvements to security posture and culture.
As threats evolve from emboldened and increasingly sophisticated malicious actors targeting critical infrastructure, the electric sector has developed a holistic and shared-responsibility approach that has supported key improvements to the security posture and culture of electric companies.
In acknowledgment of the wide-reaching effects that damage to critical infrastructure organizations and systems can impart, Security has dedicated our October 2021 issue to Critical Infrastructure Security. This month, our features cover the challenges and risks associated with this market sector, along with solutions and best practices security leaders can take to mitigate some of those risks. Here, we cover a few simple steps critical infrastructure security leaders can take to proactively build a program of resiliency.