The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
In a Federal Information Security Modernization Act of 2014 report filed with Congress last week, the White House says the number of cybersecurity incidents recorded at US federal agencies in 2019 went down by 8 percent.
Federal Energy Regulatory Commission (FERC) Chairman Neil Chatterjee announced the selection of Mittal Desai to serve as the Commission’s Chief Information Officer, effective June 7, 2020. Desai currently is a Senior Advisor and Risk Analyst in FERC’s Office of the Executive Director.
The Consumer Brands Association announced the launch of the Critical Infrastructure Supply Chain Council (CISCC), which consists of 35 trade association to address long- and short-term supply chain challenges and weaknesses due to the coronavirus pandemic.
State utility commissions can strengthen the cybersecurity of U.S. critical infrastructure – particularly the electric grid – by advancing several relevant recommendations of the Cyberspace Solarium Commission report.
Due to increased cybersecurity threats, President Donald Trump signed an executive order banning U.S. power grid entities from buying and installing electrical equipment that has been manufactured outside the U.S.
The National Governors Association (NGA) selected seven states — Colorado, Michigan, Mississippi, New York, Oregon, Pennsylvania and Tennessee — to participate in a new project focused on implementing best practices on advancing statewide cybersecurity.
ON DEMAND: New security technologies and services are often presented to security professionals within electrical utilities as a response to a perceived threat or risk, but end users can be unsure what solutions are appropriate or most effective for our specific needs. Enterprise physical security leaders are expected to make the right decisions in selecting and implementing security mitigations and controls that provide the best return on investment (ROI) and provide the appropriate level of security at their electrical utility sites.
This month in Security magazine, we examine how physical security leaders are being propelled into a unique position of revenue preservers and risk managers for their businesses. In addition, we profile Scott Ashworth, Director of Security for Atlanta United. Also, security leaders discuss how to develop cybersecurity careers, election security, data protection strategies, measuring and reporting security operations maturity and more!