Water facilities warned to improve cybersecurity

United States water facilities, which include 150,000 public water systems, have become an increasingly high-risk target for cyber criminals in recent years. This rising threat has demanded more attention and policies focused on improving cybersecurity. Water and wastewater systems are one of the 16 critical infrastructures in the U.S. The definition for inclusion in this […]

The post Water facilities warned to improve cybersecurity appeared first on Security Intelligence.

Continue reading Water facilities warned to improve cybersecurity

Today’s Biggest Threats Against the Energy Grid

Without the U.S. energy grid, life as we know it simply grinds to a halt. Businesses can’t serve customers. Homes don’t have power. Traffic lights no longer work. We depend on the grid operating reliably each and every day for business and personal tasks. That makes it even more crucial to defend our energy grid […]

The post Today’s Biggest Threats Against the Energy Grid appeared first on Security Intelligence.

Continue reading Today’s Biggest Threats Against the Energy Grid

2022 Industry Threat Recap: Energy

In 2022, 10.7% of observed cyberattacks targeted the energy industry, according to the X-Force Threat Intelligence Index 2023. This puts energy in fourth place overall — the same as the year prior and behind manufacturing, finance and insurance and professional and business services. The report notes that this reduction in total cyberattacks may be partly […]

The post 2022 Industry Threat Recap: Energy appeared first on Security Intelligence.

Continue reading 2022 Industry Threat Recap: Energy

X-Force 2022 Insights: An Expanding OT Threat Landscape

This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of malware, Industroyer2 and InController/PipeDream, and the disclosure of many operational technology (OT) vulnerabilities. The OT cyber threat landscape […]

The post X-Force 2022 Insights: An Expanding OT Threat Landscape appeared first on Security Intelligence.

Continue reading X-Force 2022 Insights: An Expanding OT Threat Landscape

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-Force Threat Intelligence Index 2022 digs into attack types, infection vectors, top threat actors, malware trends and industry-specific insights.  This year, a new industry took the infamous top spot: […]

The post Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report appeared first on Security Intelligence.

Continue reading Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Report: Cost of a Data Breach in Energy and Utilities

On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care, financial, pharmaceutical and technology verticals, according to the 17th annual Cost of a Data Breach Report. Some energy cybersecurity measures can help reduce the cost […]

The post Report: Cost of a Data Breach in Energy and Utilities appeared first on Security Intelligence.

Continue reading Report: Cost of a Data Breach in Energy and Utilities

A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

It’s no secret that cyberattacks against critical infrastructure are increasing. The recent attacks against water treatment plants, pipelines, vital hospital systems and food processing facilities have all made recent headlines and demonstrate the vulnerability of all types of critical infrastructure providers. The attacks have caused chaos, value chain disruption and crippling fuel shortages, and we […]

The post A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight appeared first on Security Intelligence.

Continue reading A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

A Quick Guide to Using the ONG-C2M2 Model

The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools allow owners and operators in the electricity and ONG sectors to assess their cybersecurity capabilities. Additionally, the tool can inform individuals on how to address their needs […]

The post A Quick Guide to Using the ONG-C2M2 Model appeared first on Security Intelligence.

Continue reading A Quick Guide to Using the ONG-C2M2 Model