Latest from todayNewsAI creates new security risks for OT networks, warns NSAAlthough intended for OT administrators, new multi-agency AI guidelines raise issues that apply across IT networks as well.By John E. DunnDec 4, 20254 minsArtificial IntelligenceCritical InfrastructureIT Strategy News Analysis Salt Typhoon APT techniques revealed in new reportBy Lucian ConstantinAug 28, 20255 minsAdvanced Persistent ThreatsCritical InfrastructureCyberattacksNews Analysis Russia-linked European attacks renew concerns over water cybersecurityBy Cynthia BrumfieldAug 20, 20256 minsCritical InfrastructureCyberattacks NewsWarning to feds: US infrastructure is under silent attackBy Taryn Plumb Jul 22, 20256 minsCritical InfrastructureCyberattacksSecurity News AnalysisCritical infrastructure under attack: Flaws becoming weapon of choiceBy John Leyden May 23, 20257 minsCritical InfrastructureCyberattacksVulnerabilities FeatureCritical infrastructure CIOs chart a vital new course for ITBy Dan Roberts May 15, 20251 minArtificial IntelligenceCritical Infrastructure OpinionThe state of cyberwar in Ukraine — and how CISOs can helpBy Christopher Burgess Apr 23, 20255 minsCritical InfrastructureCyberattacksGovernment News AnalysisToo little budget for OT security By Julia Mutzbauer Apr 4, 20252 minsCritical InfrastructureIT StrategyManufacturing Industry News AnalysisTrump shifts cyberattack readiness to state and local governments in wake of info-sharing cutsBy Cynthia Brumfield Mar 24, 20258 minsCritical InfrastructureCyberattacksGovernment IT ArticlesfeatureWhy cyber attackers are targeting your solar energy systems — and how to stop themBusinesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.By Michael Nadeau Mar 3, 2025 13 minsCritical InfrastructureSecurityUtilities Industryfeature8 biggest cybersecurity threats manufacturers faceThe manufacturing sector remains a prominent target for cybercriminals, due to complex supply chains, legacy industry control and IoT systems, and a lack of appetite for downtime.By John Leyden Dec 6, 2024 9 minsCyberattacksManufacturing IndustryRansomwarefeatureRussian group’s hack of Texas water system underscores critical OT cyber threatsCyberattacks on water systems are rising, with Russian state-linked “hacktivists” posting videos of seemingly amateur intrusions. But their prank-like nature belies more malicious possibilities, as a recent attack on the small Texas town of Stanton, reported here for the first time, illustrates.By Cynthia Brumfield Oct 21, 2024 11 minsCritical InfrastructureCyberattacksGovernment ITnewsChina-based cyber espionage campaign in SE Asia is expanding, says SophosSophos report says the Crimson Palace campaign that started in 2023 has expanded to several more countries.By Howard Solomon Sep 10, 2024 6 minsCritical InfrastructureCyberattacksGovernmentbrandpostSponsored by FortinetSecuring OT Networks Against Rising Attacks Mar 13, 2018 6 minsCritical InfrastructureSecuritynewsUS charges 5 Russian spies for Ukraine, NATO cyberattacksThe five officers of Russia’s GRU military intelligence service have been indicted for WhisperGate attacks and other activities meant to set the stage for Russia’s invasion and to deter allies from coming to Ukraine’s aid.By Lucian Constantin Sep 5, 2024 7 minsCritical InfrastructureCyberattacksGovernmentnews analysisICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwideThe malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.By Lucian Constantin Jul 23, 2024 5 minsCritical InfrastructureMalwareNetwork SecurityfeatureInside the world’s largest ‘live-fire’ cyber-defense exerciseFrom the Retamares military base in Madrid, CSO Spain receives an inside look at the Spanish team’s headquarters for Locked Shields 2024, a worldwide event for practicing coordination and cooperation in defense of cyberspace.By Mario Moreno Jul 19, 2024 7 minsCritical InfrastructureCyberattacksData and Information SecurityopinionLegacy systems are the Achilles’ heel of critical infrastructure cybersecurityChina and other nation-state bad actors are probing the defenses of critical infrastructure worldwide and legacy or outdated systems are prime targets. The time to mitigate that risk is now.By Christopher Burgess Jul 8, 2024 8 minsCritical InfrastructureSecurity PracticesThreat and Vulnerability ManagementfeatureHijack of monitoring devices highlights cyber threat to solar power infrastructureAn attack on remote monitoring devices in Japan underscores an emerging cybersecurity threat to the rapidly growing solar component of the power grid. Inverters used with solar panels could pose a more significant risk.By Cynthia Brumfield May 23, 2024 9 minsCritical InfrastructureEnergy IndustryUtilities Industrynews analysisBiden delivers updated take on security for critical infrastructure Building on previous efforts, the Biden administration's new National Security Memorandum reflects a more modern approach to protecting US critical infrastructure, giving CISA a better-defined and expanded role as the agency coordinating everything.By Cynthia Brumfield May 2, 2024 8 minsCritical InfrastructureGovernmentThreat and Vulnerability ManagementfeatureTop 10 physical security considerations for CISOsSecuring premises and devices from physical attacks can be just as challenging as defending against cyber threats. Collaboration and communication with all teams involved is the key to success.By Ericka Chickowski Apr 23, 2024 14 minsCritical InfrastructureSecuritySecurity Infrastructurenews analysisSiemens, other vendors patch critical ICS product vulnerabilitiesSome of the flaws outlined in 15 advisories could result in remote code execution on industrial control systems.By Lucian Constantin Mar 20, 2024 4 minsCritical InfrastructureVulnerabilities Show more Show less View all Resources whitepaper Why AI Hyperscalers Need to Recode Their Supply Chain Strategy Continue on to learn more The post Why AI Hyperscalers Need to Recode Their Supply Chain Strategy appeared first on Whitepaper Repository –. By GEP 29 Apr 2025Critical InfrastructureInfrastructure ManagementIT Operations View all Video on demand video What the Colonial Pipeline ransomware attack suggests about critical infrastructure security The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. May 12, 2021 22 minsCritical InfrastructureCyberattacksRansomware Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 Jan 15, 2018 9 mins Application SecurityCritical InfrastructureCybercrime See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos opinion Cybersecurity isn’t underfunded — It’s undermanaged By JC GaillardDec 11, 20257 mins C-SuiteCSO and CISOIT Strategy how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management