news analysisSiemens, other vendors patch critical ICS product vulnerabilitiesSome of the flaws outlined in 15 advisories could result in remote code execution on industrial control systems.By Lucian Constantin20 Mar 20244 minsCritical InfrastructureVulnerabilities opinion 5 ways private organizations can lead public-private cybersecurity partnershipsBy Christopher Whyte20 Mar 202413 minsCSO and CISOCritical Infrastructurenews analysis Chinese espionage a prime concern for connected vehiclesBy Cynthia Brumfield12 Mar 20249 minsAdvanced Persistent ThreatsGovernmentCritical Infrastructure news analysisInternational warning: Attackers could gain persistence on Ivanti VPN appliances By Lucian Constantin 01 Mar 20247 minsAdvanced Persistent ThreatsCritical InfrastructureVulnerabilities news analysisThree new advanced threat groups targeted industrial organizations last yearBy Lucian Constantin 28 Feb 20247 minsAdvanced Persistent ThreatsThreat and Vulnerability ManagementCritical Infrastructure news analysisBiden order bars data broker sale of Americans’ sensitive data to adversariesBy Cynthia Brumfield 28 Feb 202410 minsGovernmentData PrivacyCritical Infrastructure featureRussia's use of malware to enhance election influence operations sign of things to comeBy Christopher Whyte 28 Feb 202411 minsAdvanced Persistent ThreatsElection HackingMalware news analysisNIST releases expanded 2.0 version of the Cybersecurity FrameworkBy Cynthia Brumfield 27 Feb 20246 minsIT Governance FrameworksSupply ChainCritical Infrastructure news analysisBiden's maritime cybersecurity actions target China threatsBy Cynthia Brumfield 22 Feb 20249 minsAdvanced Persistent ThreatsGovernmentCritical Infrastructure ArticlesopinionCritical infrastructure attacks aren't all the same: Why it matters to CISOsRecent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.By Christopher Whyte 22 Feb 2024 12 minsAdvanced Persistent ThreatsCritical Infrastructurenews analysisLawmakers see power grid security risks from Chinese storage batteriesLawmakers and experts fear that the use of Chinese storage batteries could threaten the power grid, but few alternatives are in the offing, at least in the short term.By Cynthia Brumfield 16 Feb 2024 11 minsAdvanced Persistent ThreatsGovernmentCritical InfrastructureopinionA changing world requires CISOs to rethink cyber preparednessCISOs should consider a more values-oriented, socially informed approach to cyber risk as global conflict grows and many governments could change in key elections.By Christopher Whyte 13 Feb 2024 12 minsCSO and CISOCritical InfrastructureRisk ManagementnewsCISA takes on US state election security issues, deploys inspectorsRegional inspectors will help bolster US election security ahead of 2024 presidential voting.By Jon Gold 09 Feb 2024 3 minsElection HackingGovernmentCritical InfrastructureopinionDefend critical infrastructure from cyber threats like the US Navy protects ships Smart cities, power grids, and other distributed critical infrastructure could learn from how the US Navy protects the mission-readiness of its deployed fleet.By Tracy Gregorio 25 Jan 2024 6 minsThreat and Vulnerability ManagementCritical InfrastructurefeatureCivilian cyber reserves gaining steam at the US federal and state levelsVolunteer cybersecurity reserve workforces are growing in the face of infosec worker shortages, with US CyberCommand recently authorized in the 2024 NDAA to create its own civilian cybersecurity reserve corps.By Cynthia Brumfield 24 Jan 2024 7 minsGovernmentCritical InfrastructureCareersnews analysisMonths long AsyncRAT campaign targeted key US infrastructure employeesAttackers used more than 300 samples of the malicious tool and more than 100 domains to evade detection.By Lucian Constantin 09 Jan 2024 5 minsAdvanced Persistent ThreatsCyberattacksMalwarenewsAustralian government opens consultation on mandatory ransomware reporting obligationConsultation proposes new cybersecurity legislation for IoT devices, ransomware reporting and amendments to the Security of Critical Infrastructure Act 2018.By Samira Sarraf 20 Dec 2023 9 minsGovernment ITRansomwareCritical Infrastructurenews analysis2024 US NDAA boosts nuclear cybersecurity, highlights artificial intelligenceThis year's annual national defense funding bill is chock-full of cybersecurity-related provisions with spending focused on nuclear weapons and systems security, artificial intelligence, digital diplomacy, and much more.By Cynthia Brumfield 18 Dec 2023 8 minsMilitaryGenerative AICritical Infrastructurenews analysisWater system attacks spark calls for cybersecurity regulationThe Iranian CyberAv3ngers group’s simplistic exploitation of Unitronics PLCs highlights the cybersecurity weaknesses in US water utilities, the need to get devices disconnected from the internet, and renewed interest in regulation.By Cynthia Brumfield 11 Dec 2023 11 minsRegulationCyberattacksCritical Infrastructurenews analysisRussia's Fancy Bear launches mass credential collection campaigns The campaigns exploit Outlook and WinRAR flaws to target government, defense, and other entities, and they represent a change of tactic for the APT28 group. By Lucian Constantin 05 Dec 2023 5 minsAdvanced Persistent ThreatsCritical InfrastructureVulnerabilitiesnews analysisAustralia’s cybersecurity strategy focuses on protecting small businesses and critical infrastructureThe Australian federal government released the 2023-2030 cybersecurity strategy, which focuses on protecting households and small businesses and has big expectations from telecommunications providers.By Samira Sarraf 21 Nov 2023 8 minsSmall and Medium BusinessGovernmentCritical Infrastructure Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence