Two teenage boys jumped a security fence at a research reactor in the San Francisco Bay Area, but there was no threat to the facility that uses highly enriched uranium that could be used to make a nuclear bomb.
Rapid transit agencies across the U.S. are installing information management systems, video analytics and more to deter and combat crime and terror attacks that can impact millions of riders each day.
A Global Security Operations Center can take the form of a new facility or be housed in an existing one, but the value is undeniable to support a security enterprise’s goals and operations.
Cost recovery for electric sector cybersecurity investments and development of resilience metrics to gauge the industry's progress are two of several recommendations by Vermont Law School researchers and a six-month study of electric grid security.
U.S. Senators Cory Gardner (R-CO) and Michael Bennet (D-CO) introduced two pieces of legislation to protect the country’s energy grid from cyber-attacks.
By definition, a perimeter is the outer boundary, and securing that perimeter means protecting that area. Everything has a perimeter, from a large university campus to your own personal space on that campus. Law enforcement and security personnel have predefined outer perimeters that keep people either in or out in the case of an event. But you should also look within the perimeter to criticalities that could present problems.
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI).