ICS/SCADA
IS hackers are attacking the US energy grid
The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …
Nuclear facilities are wide open to cyber attacks
You would think that, given the potential disastrous consequences of a successful hack, the computer systems and networks of nuclear facilities would be better secured agains …
Quantifiable differences in security performance across industries
BitSight Technologies analyzed Security Ratings of nearly 10,000 organizations in six industries – finance, federal government, retail, energy and utilities, healthcare and …
Cyber attack on US power grid could result in losses up to $1 trillion
When, on Wednesday, the New York Stock Exchange halted trading, The Wall Street Journal website went down, and United Airlines grounded flights – all practically at the …
Energy security pros: More competent, or just naive?
Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …
153 machines still infected with Stuxnet
“The threat that Stuxnet presents for nuclear power plants is far from over, as there are still 153 distinct machines infected with it around the world. The discovery …
NIST updates ICS security guide
The National Institute of Standards and Technology (NIST) has issued the second revision to its Guide to Industrial Control Systems (ICS) Security. It includes new guidance on …
A look at emergent threats and their influence
Analyzing Dell data sources and the 2014 threat landscape, their new report found a surge in point-of-sale (POS) malware, increased malware traffic within encrypted (https) …
How vulnerable is our critical national infrastructure?
Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on …
How important is the critical information infrastructure?
ENISA issued methodologies for the identification of Critical Information Infrastructure (CII) services in communication networks. This study provides state of the art …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
Certifying ICS/SCADA professionals
An online survey and interviews with experts from EU Member States and worldwide, analyses how current initiatives on the certification of professional skills are related to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)