article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries. Wed, 01/13/2021 - 09:42. Cybersecurity challenges. A recent U.S.

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

What further compounds an already complex architectural and security landscape is the fact that critical infrastructure industries in various countries tend to be either partially or fully government controlled; with many providing “essential services” such as Healthcare, Water, Power, Emergency Services and Food production.

IoT 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco named a leader in The Forrester Wave™: ICS Security

Cisco Security

Interest in industrial control systems (ICS) security has shot up in response to cyberattacks on organizations like the city of Oldsmar’s water utility , Honda , Merck , Maersk , and Johannesburg’s electric utility. New technologies have matured over the last few years to help build more advanced industrial security architectures.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. Cisco Secure Firewall integrations. Cisco Secure Firewall has several new partner integrations. The Secure Firewall app for Splunk has been updated. Read more here.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

To be successful, an attacker must gain access to the 5G Service Based Architecture. Network Functions Virtualization (NFV) is a virtualized network infrastructure where typical network functions – like firewalls , routing, and SD-WAN – can be installed as software through abstraction. 5G Systems Architecture.

Risk 135
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Before companies can effectively and safely use generative AI tools, employees must be educated on utilizing best practices: writing prompts that achieve desired outcomes, keeping data security and privacy in mind when inputting data, identifying the quality and security of AI, verifying AI output, and more,” elaborates Arti Raman, CEO Portal26.

article thumbnail

AT&T Cybersecurity Insights Report: Securing the Edge – Available today

CyberSecurity Insiders

Focuses on common edge use cases in six vertical industries – healthcare, retail, finance, manufacturing, energy, and U.S. At the onset of our research, we wanted to understand three primary things: What are the most common architectures used in edge networks? What are the most common use cases of these architectures?