Critical Infrastructure

The SecurityInfoWatch.com Critical Infrastructure category is a collection of news, analysis, and other information relevant to security professionals who work in or provide services to the Critical Infrastructure market. It covers issues pertaining to security management as well as security technology deployments at utilities, airports, transit operators, oil and petrochemical facilities, and other critical infrastructure operators.
SIW_ISCWest25_PROMETHEUS
April 2, 2025
Prometheus Security Group Global (PSG) specializes in developing and integrating Government-Off-the-Shelf (GOTS) and Commercial-Off-the-Shelf (COTS) security technologies for ...
Credit: gorodenkoff
In our work around infant abduction prevention, we carefully assess each of the unit's physical egress points. We are looking for the shortest possible path to get an infant from the unit into a car or otherwise offsite.
March 13, 2025
Healthcare facilities must adopt a comprehensive security framework that goes beyond guidelines to protect vulnerable patients.
N.J. faces alarming threats in an unsettling extremism climate, officials warn
March 12, 2025
The latest threat assessment by the state Office of Homeland Security and Preparedness presents an unsettling picture for security officials.
FortiGate Rugged
March 11, 2025
Improvements include deeper OT-specific threat visibility, expanded ruggedized solutions for segmentation and 5G in harsh environments, and an upgraded OT SecOps portfolio.
Armis acquires OTORIO to expand its OT and cyber-physical security portfolio
March 7, 2025
OTORIO has deep domain technical expertise, securing heavy industry and critical infrastructure with customers across the globe.
Bilanol / iStock / Getty Images Plus via Getty Images
Recent inspections from the EPA found that more than 70% of the U.S.'s major water systems have critical cybersecurity vulnerabilities.
Feb. 26, 2025
Cyberattacks on the software supply chain are a national security threat, necessitating stricter cybersecurity practices and enforcement to protect critical infrastructure.
Credit: pixelfit
It seems quaint now, but once viewed as recreational gadgets, unmanned aerial systems (UAS) have morphed into sophisticated platforms for espionage, sabotage, and intentional and unintentional operational disruption, as highlighted by these recent situations.
Feb. 12, 2025
Recent events demonstrate how this evolving technology is wreaking havoc on critical infrastructure.
Monica Herndon
Caesars Superdome in New Orleans, the site of Super Bowl LIX between the Kansas City Chiefs and Philadelphia Eagles.
Feb. 6, 2025
New Orleans is enhancing security for Super Bowl LIX, marking the historic first attendance of a sitting president at the event.
Credit: da-kuk
What makes these campaigns particularly insidious is their stealth. These threat actors use sophisticated, often custom-built tools to penetrate networks and remain undetected for long periods.
Feb. 5, 2025
From Volt Typhoon to Flax Typhoon, the goal is to destabilize critical infrastructure, disrupt economies, and undermine societal stability.
Credit: Just Super
A platform-agnostic Managed Detection and Response (MDR) solution refers to a service provider that offers MDR services independently of any specific cybersecurity platform or technology stack, becoming a “platform” in and of itself, along with advisory services that help select the best-of-breed tooling.
Jan. 29, 2025
Whether opting for an integrated platform or a mix of specialized tools, the key is establishing a robust cybersecurity strategy.
Update to ISA/IEC 62443 standards addresses cybersecurity in industrial and critical infrastructure operations
This update of the 2010 version provides significant technical changes, including a revision of the requirement structure into security program elements and a maturity model for...
New study reveals 92% of industrial sites at risk from unsecured remote access
Jan. 22, 2025
The DeNexus study highlights the critical need for enhanced security measures in industrial remote access solutions.
markfreedmanpodcastgraphic
Jan. 22, 2025
Mark Freedman discusses online radicalization, social media, and rising threats of violence from both sides of the political aisle.
Energy companies boost investment in cyber arms race to manage industry's 'greatest risk'
Jan. 22, 2025
According to the latest Energy Cyber Priority report from DNV Cyber, energy companies are making progress in cybersecurity.
Credit: thitivong
In an increasingly competitive global marketplace, now is the time to consider partnering with an LSP to take advantage of the many benefits of TMS and integration technology.
Jan. 18, 2025
Investing in a partnership with a Logistics Service Provider (LSP) can help organizations implement and operate a TMS would be a transformative step.
Credit:gopixa
As the global financial system becomes more interconnected, it's apparent that regulatory frameworks like DORA are not isolated to one region. U.S. companies, especially those in the information and communication technology (ICT) sectors, need to pay close attention to DORA’s implementation.
Jan. 17, 2025
As DORA takes effect, recovery resilience tops the compliance agenda.