Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ICS

Enhancing Cyber Resilience: Safeguarding the Electricity Grid

Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced its participation in the vendor affiliate program of the Electricity Information Sharing and Analysis Center (E-ISAC). This collaboration marks a significant step forward in fortifying North America’s electricity grid against cyber threats.

Trainspotting: Lessons in Network Security and Critical National Infrastructure

Today, in the heart of London, I caught sight of a screen on platform four at Vauxhall train station. On it was displayed a busy illustration of the marvels of modern transportation: trains moving seamlessly across multiple lines; their positions, destinations, and tracks all displaying tightly orchestrated precision in real-time. It was a compelling depiction of the complexity of a public rail system on a small island–a tightly woven network where data integrity is paramount.
Featured Post

Utilities and Energy a Prime Target For API Security Incidents

As a critical element of national infrastructures worldwide, the energy and utilities sector literally keeps the lights on in today's world. When water, gas, or electricity is cut off from businesses and families, it can have catastrophic consequences. To improve resilience and guarantee service uptime, energy and utilities companies know that digitisation is key to transforming the services they deliver, but aging technology stacks, a lack of interoperability and collaboration, and poor security hygiene are all limiting progress.

Disruption of Transportation Services and Infrastructure: NoName Hacking Group Strikes in Support of Polish Farmers

In a bold move aimed at raising awareness and protest against the pro-Ukrainian stance of the Polish authorities, the notorious NoName hacking group launched a series of cyber attacks targeting critical infrastructure in Poland. The group's motive was clear - to disrupt transportation services and infrastructure to show solidarity with Polish farmers' plight. Who is NoName hacking group and what is their motive?

Mining Operations: Critical Cybersecurity Threats & Trends Revealed

Cybersecurity professionals often point out that threat actors do not differentiate when choosing a victim. To an attacker, a hospital is as useful a target as a law firm or even a mining operation. After all, a mining company has the same attributes that make it as interesting as any other target: proprietary data and customer information, and it must stay in operation. All of which an attacker can exploit for financial gain.

Improving OT Security in Industrial Processes

Have you ever considered that even before you enjoy the first sip of your favorite morning beverage, you have probably interacted with at least half of the 16 critical infrastructure sectors that keep a nation running? In one way or another, the simple act of brewing a cup of tea would probably not be possible without interacting with water, energy, manufacturing, food and agriculture, waste, transportation, and financial sectors.

Programmable Logic Controllers and Cybersecurity Risk

Considered the "brain" of industrial automation, programmable logic controllers (PLCs) are an important factor in industrial control systems (ICS), especially for critical infrastructure in the public sector. PLCs are an industrial computer used to control automated devices in a variety of industries, including industrial manufacturing and critical infrastructure. This article offers suggestions for PLC security risks, as well as cybersecurity standards for risk mitigation.

Chinese Hacking Group Targets US Critical Infrastructure

Earlier this month, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint warning that the hacking group known as “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years.

Strengthening small utilities: The power of public-private partnership

In the wake of recent cyber attacks against US water utilities, the vulnerability of local entities dependent on operational technology (OT) has been starkly highlighted. This danger was further emphasized last week when Congress held a hearing titled Securing Operational Technology: A Deep Dive into the Water Sector. Witnesses at the hearing painted a stark picture of the significant cybersecurity risks facing small utility companies today.

Bolstering Cyber Resilience in the US Water Sector: A Call to Action

Tomorrow, February 6, 2024, the House Homeland Security Committee will hold a hearing on securing US water systems from cyberattacks. Following last year’s widely publicized attack on the municipal water system in Aliquippa, Pennsylvania, Congress, the Cybersecurity and Infrastructure Security Agency (CISA), and industry leaders have rightly increased their focus on the unique risks facing water systems across the country.