Critical Infrastructure Security
Know Your Boundaries To Know your Strategy
Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following...
Securing Access to Our Nation’s Critical Infrastructure
Threats to energy and utilities firms target enterprise IT networks - here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.
Protecting Critical Infrastructure Networks with Zero Trust Segmentation
Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked operational technology. Further, critical infrastructure is often managed and deployed over connected systems supported...
Laying the Foundation to Secure Critical Infrastructure
With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.
Don’t Let the Lights Go Out on Critical Infrastructure Security
As cyberattack prevention becomes an increasingly critical focus of homeland security efforts, industry observers are taking a closer look at the readiness of the nation’s critical infrastructure. Some believe there is reason to worry. Researchers recently revealed that many industrial systems, including some used in public utilities, come with default passwords that are readily available […]