As part of the U.S. Department of Homeland Security’s (DHS) ongoing efforts to support state, local, tribal, and territorial partners, Acting Secretary Chad F. Wolf announced final allocations of $385 million for seven Fiscal Year (FY) 2020 DHS competitive preparedness grant programs.
In an effort to enable public safety-focused entities to tap social media analytics in emergency response, The National Institute of Standards and Technology (NIST)’s Text Retrieval Conference, or TREC, Incident Streams project intends to gain access to Twitter’s Enterprise-Level application programming interface, or API.
The Cybersecurity and Infrastructure Security Agency (CISA) has released its five-year industrial control systems (ICS) strategy: Securing Industrial Control Systems: A Unified Initiative.
Businesses and organizations across every vertical are faced with a new challenge: how to get people back to work safely, efficiently and in compliance with state and local mandates.
U.S. Transportation Secretary Elaine L. Chao announced public health guidance to airlines and airports for the recovery of the Nation’s air transportation system from the coronavirus disease 2019 (COVID-19) public health emergency.
Governor Greg Abbott issued an Executive Order requiring all Texans to wear a face covering over the nose and mouth in public spaces in counties with 20 or more positive COVID-19 cases, with few exceptions.
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.