article thumbnail

Ransomware and energy and utilities

CyberSecurity Insiders

This is a blog series focused on providing energy and utility industries with helpful insights and practical, helpful information on cybersecurity. The exponential growth of IoT devices in the energy and utilities industry has greatly increased focus on cybersecurity. First is an… Posted by: Theresa Lanowitz.

article thumbnail

Ransomware and Energy and Utilities

CyberSecurity Insiders

This is a blog series focused on providing energy and utility industries with helpful insights and practical, helpful information on cybersecurity. The exponential growth of IoT devices in the energy and utilities industry has greatly increased focus on cybersecurity. First is an… Posted by: Theresa Lanowitz.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Risk-based security now more important than ever for Energy and Utilities!

CyberSecurity Insiders

This is the third of three blogs in a series to help the energy and utility industries. You can read the first blog on Ransomware and Energy and Utilities and the second blog on Threat Intelligence and Energy and Utilities as well. for utilizing IoT. CSA_STOP-MCA-AGAINST-OT_UOO13672321.PDF

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The Ongoing Cyber Threat to Critical Infrastructure. With that in mind, Thales has launched the 2022 Thales Data Threat Report Critical Infrastructure Edition, which includes responses from 300 security leaders and practitioners within critical infrastructure organizations. Thu, 07/21/2022 - 12:28.

article thumbnail

I’m Sorry, But That’s Classified

Approachable Cyber Threats

Classification of Atomic Energy Information Atomic energy information (AEI) refers to information related to the design, manufacture, and use of atomic weapons and nuclear energy. Atomic energy information is classified outside of the standard NSI classification system. What is a Security Clearance then?”

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

Cyber threats from rival nation states and rogue actors are very plausible and are also becoming increasingly common owing to the geopolitics of the current era. IoT sensors and devices. Special controls must be in place for IoT devices as well. There are hierarchical divisions on the basis of which a network is built.

IoT 134
article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

While finance, healthcare, energy and utilities companies, along with the private sector will increase their cybersecurity spending, the manufacturing industry will have the most significant impact on disruption. Manufacturing is a prime area for disruption with the increase in the number of IoT devices during the pandemic.