Critical Infrastructure

The SecurityInfoWatch.com Critical Infrastructure category is a collection of news, analysis, and other information relevant to security professionals who work in or provide services to the Critical Infrastructure market. It covers issues pertaining to security management as well as security technology deployments at utilities, airports, transit operators, oil and petrochemical facilities, and other critical infrastructure operators.
Credit: Matic Grmek
Ransomware-as-a-service — known as RaaS — operators such as LockBit rely on networks of other malicious hackers known as affiliates to carry out attacks. RaaS operators provide the malware and infrastructure to affiliates, and the two sides share the ransom paid.
Cybersecurity

How today's ransomware groups operate

Nov. 20, 2024
Vulnerability-related threat intelligence can help organizations understand which software flaws threat actors are interested in exploiting.
Credit: adamkaz
Election security represents a high-profile use case for machine identity management from which business leaders should take caution.
Critical Infrastructure

Machine identities and digital trust: An election security case study

Oct. 29, 2024
Election officials and industry executives must prioritize IoT security by embedding it from the start of machine identity creation.
nationalcyberstock
Government

Cyware and ECS ally to strengthen government cybersecurity, enhanced intel exchange

Oct. 28, 2024
The design partnership aims to empower federal entities with tailored threat intelligence solutions that enable collective defense and critical infrastructure security.
Credit: khaled Ahmed
With heightened concerns around election integrity, implementing DMARC demonstrates a campaign’s commitment to secure, authentic communication and adherence to cybersecurity standards.
Cybersecurity

U.S. political campaigns are strengthening against cyber threats

Oct. 23, 2024
Both parties are seeing an urgent need for DMARC implementation and compliance.
Credit: DragonImages
More than ever, these growing risks mean that security teams will need to start going beyond the mitigation of software vulnerabilities or the hunting down of flaws in open-source software. Both have dominated discussions of software supply chain security (SSCS).
Cybersecurity

The procurement challenge breaks open the black box that is commercial software

Oct. 22, 2024
Threats to software supply chains are eroding the existing enterprise software procurement model, so it’s time for a change.
teleport
Access Control

Teleport delivers access control monitoring for critical infrastructure resources

Oct. 18, 2024
New updates to Teleport Policy enable security professionals to cut through the noise of alert fatigue.
cisa_post
Industry News

CISA, FBI, NSA, and international partners release advisory on Iranian cyberattacks against critical infrastructure

Oct. 16, 2024
This advisory provides known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by Iranian actors.
Credit: mirsad sarajlic
Today’s cybercrime groups are sharing intelligence with one another, sometimes even collaborating with nation-states to carry out attacks that drive the agendas of both groups.
Cybersecurity

How to combat a new generation of threats with a new kind of threat intelligence

Oct. 14, 2024
Threat actors are not just focused on an organization’s IT infrastructure but its entire digital footprint.
Credit: Motortion
Cybersecurity startups coming out of Israel don’t necessarily have the business acumen needed to grow a company in the U.S. This is one of the reasons a strong investment partner is so critical.
Security Executives

From Israel to the US: Enhancing cybersecurity through strategic partnerships

Oct. 11, 2024
As collaborative efforts continue to bring investors and technology into lockstep, the cybersecurity sector is poised for significant growth and opportunity.
americanwater
Critical Infrastructure

American Water reactivating systems after cyber event

Oct. 11, 2024
The company continues to have no indication that its water and wastewater facilities were impacted by this incident.
Copyright: Leonard Zhukovsky
By using hurricane-related terms and associating themselves with disaster relief, these domains aim to create a sense of urgency, making it more likely that victims will fall for the phishing schemes.
Cybersecurity

FEMA scams and phishing threats pollute hurricane relief efforts

Oct. 8, 2024
With Hurricane Helene and other recent hurricanes affecting Florida, Veriti’s research team has identified several emerging cyber threats targeting vulnerable individuals and ...
Credit: Dragos Condrea
If the business questions why the SOC team needs a TIP, it delivers plenty of benefits: It can reduce risk, improve defenses, and enable the organization to execute strategic and tactical enterprise goals while staying on budget.
Security Executives

Not all TIP technology solutions are created equal

Oct. 2, 2024
SOC teams should view the vendor selection process as a journey, not a simple product purchase.