Remove Energy and Utilities Remove Firewall Remove Risk Remove Technology
article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries. Wed, 01/13/2021 - 09:42. Cybersecurity challenges. A recent U.S.

article thumbnail

Colonial Pipeline attack spotlights risks of geographically dispersed networks in an industry that is ‘far behind’

SC Magazine

demonstrating the unique cybersecurity risks and vulnerabilities associated with geographically distributed networks. Just as oil and gas can flow up and down the pipeline, so can malware, reaching remote facilities whose IT and operational technology systems may not be adequately fortified to defend against an attack.

Risk 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

In an example from last year, lack of risk-based adoption of cloud software and lack of controls to prevent access to ICS networks caused service disruption at a US drinking water treatment facility, where cyber-attack via poorly controlled cloud software (desktop sharing) had increased sodium hydroxide levels in drinking water [v].

IoT 134
article thumbnail

Cisco named a leader in The Forrester Wave™: ICS Security

Cisco Security

Interest in industrial control systems (ICS) security has shot up in response to cyberattacks on organizations like the city of Oldsmar’s water utility , Honda , Merck , Maersk , and Johannesburg’s electric utility. New technologies have matured over the last few years to help build more advanced industrial security architectures.

article thumbnail

Why so many companies still find moving to DevSecOps hard

SC Magazine

Security pros face great challenges in managing all the products and tools they use to handle the cyber risks they face. What suite of tools will work best for the existing technology stack? For example, RASP (runtime application self-protection) technology is often applied to harden security posture without sacrificing coding speed.

article thumbnail

A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT

CyberSecurity Insiders

More than 1,500 organizations worldwide spanning Financial Services, Defense, Manufacturing, Energy, Aerospace, and Transportation Systems trust OPSWAT to secure their files and devices; ensure compliance with industry and government-driven policies and regulations, and protect their reputation, finances,? networking infrastructure.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Virsec is a leading innovator of memory protection technologies. Here’s what I took away from our discussion: Transient hacks.

Hacking 212