Critical Infrastructure

The SecurityInfoWatch.com Critical Infrastructure category is a collection of news, analysis, and other information relevant to security professionals who work in or provide services to the Critical Infrastructure market. It covers issues pertaining to security management as well as security technology deployments at utilities, airports, transit operators, oil and petrochemical facilities, and other critical infrastructure operators.
OPSWAT acquires data diode technology company Fend
Critical Infrastructure

OPSWAT acquires data diode technology company Fend

Dec. 18, 2024
The acquisition of Fend broadens OPSWAT's end-to-end cybersecurity product offerings in the field of data diodes and unidirectional gateway solutions.
thumbnail_688711380abloy_italy202316
Hosted/Managed Access Control

ALCEA GATEWAY Bridge

Dec. 12, 2024
The new ALCEA GATEWAY offers comprehensive real-time situational awareness, remote keyless opening and monitoring, and keyless access management.
Credit: Yuri_Arcurs
When we think about cybersecurity, we often focus on blocking bad actors and avoiding attacks like phishing and ransomware. However, data is constantly shared without people's knowledge or consent, and until relatively recently, this practice was legal and there were very few barriers to doing so.
Breach Detection

Why it’s not just about hackers anymore

Dec. 10, 2024
The growing privacy crisis requires proactive auditing, reducing unnecessary tracking, limiting third-party data sharing and prioritizing consent.
How water and wastewater systems can meet the EPA’s cyber hygiene demands
Critical Infrastructure

How water and wastewater systems can meet the EPA’s cyber hygiene demands

Dec. 10, 2024
Following several cyber attacks on U.S. critical infrastructure, the EPA has broadened the scope of its compliance inspections into the cyber realm.
Credit: Olivier Le Moal
Significant blemishes in U.S. history, such as the 2014 cyber infiltration of Sony Pictures and the 2016 cyberattack on the Democratic National Convention information systems, serve as stark reminders about nation-state actors’ advanced capabilities to reach out and touch even U.S. companies and infrastructure beyond the IT closets and keyboards.
Cybersecurity

Strategies Emerging to Fill in the Physical Security Gaps with Zero Trust

Dec. 9, 2024
The U.S. cyber and security industry has made great strides after a long-standing lag by the federal government toward centralized Zero Trust efforts.
Credit: roberthyrons
Designing and implementing a robust physical security program is a significant undertaking, even for a single-site organization. However, when scaling these efforts globally, security professionals in multinational corporations face a unique set of obstacles that demand meticulous planning.
Security Executives

Challenges in Starting up a Physical Security Program for a Multi-National Corporation

Dec. 9, 2024
Global security programs face challenges as rapidly growing companies expand internationally, requiring security strategies to align with business needs and operational growth...
Credit: stellalevi
Today’s credential screening technology in 25 major U.S. airports and hundreds more by the end of 2025 will move travelers faster and safer through verification employing mobile phones.
Access & Identity

TSA Speeds Millions Through Airports Using Identity Verification Technology

Dec. 9, 2024
As the TSA-designed ID, the Real ID Driver’s License will provide many additional benefits to Americans.
Credit: Dragos Condrea
Salt Typhoon’s operations are characterized by sophisticated tactics aimed at persistent access to their targets. They exploit vulnerabilities in public-facing systems, including routers and firewalls, and leverage compromised credentials to escalate privileges and move laterally within networks.
Breach Detection

Chinese hackers continue to torment U.S. telecommunication companies

Dec. 4, 2024
These continued Salt Typhoon attacks threaten the nation’s critical infrastructure and national security.
Compromised software code poses new systemic risk to U.S. critical infrastructure
Critical Infrastructure

Compromised software code poses new systemic risk to U.S. critical infrastructure

Compromised software code can provide threat actors with a "backdoor" into power grids, oil and gas pipelines, and communication networks.
Nozomi Networks teams with Advens to defend industrial, critical infrastructure from cyber threats
Cybersecurity

Nozomi Networks teams with Advens to defend industrial, critical infrastructure from cyber threats

Dec. 4, 2024
Advens now offers Nozomi Networks' solutions for OT and IoT visibility, network monitoring, threat detection, and risk management.
DHS unveils new framework for the safe and secure deployment of AI in critical infrastructure
Critical Infrastructure

DHS unveils new framework for the safe and secure deployment of AI in critical infrastructure

Nov. 22, 2024
Public sector entities, including federal, state, local, tribal, and territorial governments, are essential to the responsible adoption of AI in critical infrastructure.