Critical Infrastructure

The SecurityInfoWatch.com Critical Infrastructure category is a collection of news, analysis, and other information relevant to security professionals who work in or provide services to the Critical Infrastructure market. It covers issues pertaining to security management as well as security technology deployments at utilities, airports, transit operators, oil and petrochemical facilities, and other critical infrastructure operators.
DHS unveils new framework for the safe and secure deployment of AI in critical infrastructure
Critical Infrastructure

DHS unveils new framework for the safe and secure deployment of AI in critical infrastructure

Nov. 22, 2024
Public sector entities, including federal, state, local, tribal, and territorial governments, are essential to the responsible adoption of AI in critical infrastructure.
Credit: Matic Grmek
Ransomware-as-a-service — known as RaaS — operators such as LockBit rely on networks of other malicious hackers known as affiliates to carry out attacks. RaaS operators provide the malware and infrastructure to affiliates, and the two sides share the ransom paid.
Cybersecurity

How today's ransomware groups operate

Nov. 20, 2024
Vulnerability-related threat intelligence can help organizations understand which software flaws threat actors are interested in exploiting.
Credit: BlackJack3D
HiveWatch’s AI Operator is positioned as the game-changer, automating mundane tasks while empowering human professionals to focus on complex strategic initiatives.
Artificial Intelligence

HiveWatch unveils AI Operator powered by Anthropic’s Claude

Nov. 20, 2024
This AI innovation aims to transform security teams' operations, empowering them to be more proactive and intelligence-driven.
Horizon3.ai launches NodeZero Kubernetes Pentesting
Critical Infrastructure

Horizon3.ai launches NodeZero Kubernetes Pentesting

Nov. 12, 2024
NodeZero's pentesting capabilities are designed for any Kubernetes distribution, including EKS, GKE, and AKS.
Credit: stevegeer
According to a U.S. Department of Justice report, illegal drone drops at correctional facilities are increasing by 50% or more annually, with no signs of slowing. These aerial invaders carry everything from drugs and cell phones to weapons, creating what security experts call an unprecedented threat to facility safety.
Unmanned Aerial Vehicles (Drones)

Prison security looks skyward with advanced drone detection network

Nov. 7, 2024
The drone threat continues to evolve, with smugglers adopting increasingly sophisticated tactics.
TSAcriticalinfrastructure
Industry News

Proposed TSA rule would establish cyber risk management programs for pipelines, railroads

Nov. 7, 2024
The proposed rule leverages the cybersecurity framework developed by NIST and the cross-sector cybersecurity performance goals developed by CISA.
Credit: mikkelwilliam
As geopolitical tensions rise and criminal networks exploit technological vulnerabilities, the need for preparedness and resilience becomes more urgent than ever, demanding immediate action.
Security Executives

Executive Insights: How tactical expertise shields global enterprises in an unstable world

Nov. 4, 2024
In an era of unprecedented threats Crisis24’s proactive approach, enhanced by AI and decades of field experience, empowers companies to stay resilient and ready.
Credit: Andrey Semenov
By proactively identifying and addressing potential flaws in your infrastructure, you can significantly reduce your vulnerability, even if you've invested heavily in physical security measures.
Access Control

Is your data center or server room at risk?

Nov. 1, 2024
Physical security measures are a critical element in keeping data safe from bad actors
repairmanrunningcodedatacenter_48225785861
Critical Infrastructure

Cloud Security Alliance examines application of Zero Trust principles for critical infrastructure

The new paper lays out the foundational concepts of Zero Trust and provides a tailored roadmap for implementing these principles effectively in OT/ICS settings.
Credit: adamkaz
Election security represents a high-profile use case for machine identity management from which business leaders should take caution.
Critical Infrastructure

Machine identities and digital trust: An election security case study

Oct. 29, 2024
Election officials and industry executives must prioritize IoT security by embedding it from the start of machine identity creation.
nationalcyberstock
Government

Cyware and ECS ally to strengthen government cybersecurity, enhanced intel exchange

Oct. 28, 2024
The design partnership aims to empower federal entities with tailored threat intelligence solutions that enable collective defense and critical infrastructure security.