This blog delves into two crucial issues for EU policymakers to enhance Europe's cyber resilience: unsupported connected devices within critical infrastructure networks and the handling of discovered vulnerabilities by government agencies.
From transportation systems to water utilities, now is the time to recognize the unique opportunity to learn from current events and improve for the future.
Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following...
Threats to energy and utilities firms target enterprise IT networks - here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.
Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked operational technology. Further, critical infrastructure is often managed and deployed over connected systems supported...
With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.
As cyberattack prevention becomes an increasingly critical focus of homeland security efforts, industry observers are taking a closer look at the readiness of the nation’s critical infrastructure. Some believe there is reason to worry. Researchers recently revealed that many industrial systems, including some used in public utilities, come with default passwords that are readily available […]