Search
Close this search box.

Regulations

Courtesy: CFE Media and Technology

The impact of proposed SEC cybersecurity rules on public companies

In March of 2022, the Securities and Exchange Commission (SEC) proposed amendments to its cybersecurity rules and regulations. The proposed changes would require reporting of cyber incidents and disclosure of cyber mitigation strategies, both leading […]

Best practices in OT vulnerability management

Best practices in OT vulnerability management

Whether an organization is managing vulnerabilities within information technology (IT) or operational technology (OT) systems, prioritization stands as a huge factor for impactfully reducing the risk of attacks that leverage flaws within these systems. Organizations […]

Will CISA recommend securing industrial control systems?

Will CISA recommend securing industrial control systems?

The Cybersecurity and Infrastructure Security Agency (CISA) has always made recommendations along the lines of keeping the attackers out, performing cyber hygiene and detecting attacks, but they have rarely recommended the monitoring and controlling of […]

As threat increases, college cybersecurity programs are more in demand

More connected industrial workers: How are companies mitigating risk?

Learning Objectives Industrial remote workers have increased the number of remote connections. Cybersecurity risk increases with more remote connections. How are industrial companies mitigating risk? Connected workers are appearing in every industry and industrial activity. […]

Courtesy: CFE Media and Technology

How ransomware gangs leverage security compliance

Compliance regulations like the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) are created with good intentions. They aim to secure user data, ensure privacy and build trust between the companies and […]

The Biden administration expands its focus on ICS cybersecurity

The Biden administration expands its focus on ICS cybersecurity

While President Joe Biden’s July 28 executive order establishing his industrial control system (ICS) cybersecurity initiative was focused primarily on the electricity subsector, it did say that an action plan for natural gas pipelines was […]

Courtesy: CFE Media and Technology

Ron Brash Interview: Expert advice on the CVSS and OT Systems

With the rise ransomware and increasingly frequent attacks on national critical Infrastructure, the U.S. government has tried to step in with a few measures to shore up cybersecurity. These have included things like the Executive […]

How the CMMC impacts the Department of Defense supply chain

How the CMMC impacts the Department of Defense supply chain

The U.S. Department of Defense (DoD) supply chain has been under attack. This year’s ransomware events — such as the ones faced by a U.S. maritime base that brought cameras, door-access control systems and critical […]

The elevation of cybercrime to terrorism threat status

The elevation of cybercrime to terrorism threat status

Prior to the late ’90s, terrorist groups were most often viewed through the lens of law enforcement and crime, not as a national security priority. Their pursuit was led by the FBI and international police […]

ROI-minded integration decision aspects. Courtesy: Meditechsafe

Changing a network security approach

Most organizations rely heavily on security architects to vet products and assemble optimal solutions that align with security, technology, and business requirements. These technical experts spend a disproportionately large amount of energy on the integration […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Companies need to reassess their cyber physical security risk

Due to innovative business models behind ransomware-as-a-service, fundamental increase in reliance on vulnerable information technology (IT) systems by physical process controls and the evolving cyber insurance market means that every industrial organization needs to reassess […]

Bridging the cybersecurity leadership gap

Bridging the cybersecurity leadership gap

Ransomware attacks have skyrocketed in recent years. There is no sign of slowing down despite the increase in spending and risk awareness. Cybersecurity personnel often feel burned-out and relatively ineffective. They are constantly firefighting, and […]

Differences between local and international cybersecurity standards

Differences between local and international cybersecurity standards

The Federal Service for Technical and Export Control (FSTEC) is a difficult topic, but it is essential to explore in order to understand how this strict Russian regulation affects cybersecurity tool manufacturers and system integrators. […]

Courtesy: Industrial Defender

Managing cybersecurity for renewable energy resources

President Biden declared January 27, 2021 to be Climate Day, and released a set of Executive Actions to address the Climate Crisis. The strategic goal of these policies is to “lead a clean energy revolution […]

Courtesy: SecurityHQ

Machine learning, cyber kill chain analysis white paper released

Over the last few months, there has a noticeable uptick in public ransomware attacks. High-profile and often highly advanced ransomware variants, such as Egregor, Maze, REvil/Sodinokibi have been noted in almost every industry around the […]

The International Society of Automation

The International Society of Automation

The International Society of Automation (isa.org) is a non-profit professional association founded in 1945 to create a better world through automation. ISA advances technical competence by connecting the automation community to achieve operational excellence. The […]

NIST: Guide to Industrial Control Systems Cybersecurity

NIST: Guide to Industrial Control Systems Cybersecurity

Despite the threats of cyberattack on computer-controlled industrial systems, utilities and other users of these systems can be hesitant to adopt common security technologies out of concern for their impact on system performance. NIST has […]

Supply chain security advice and guidelines

Supply chain security advice and guidelines

Supply chain security is crucial as data becomes more important to a company’s success. Ten principles from the Charter of Trust and 17 baseline requirements for the supply chain are highlighted.

Courtesy: CFE Media and Technology

The impact of proposed SEC cybersecurity rules on public companies

In March of 2022, the Securities and Exchange Commission (SEC) proposed amendments to its cybersecurity rules and regulations. The proposed changes would require reporting of cyber incidents and disclosure of cyber mitigation strategies, both leading […]

Best practices in OT vulnerability management

Best practices in OT vulnerability management

Whether an organization is managing vulnerabilities within information technology (IT) or operational technology (OT) systems, prioritization stands as a huge factor for impactfully reducing the risk of attacks that leverage flaws within these systems. Organizations […]

Will CISA recommend securing industrial control systems?

Will CISA recommend securing industrial control systems?

The Cybersecurity and Infrastructure Security Agency (CISA) has always made recommendations along the lines of keeping the attackers out, performing cyber hygiene and detecting attacks, but they have rarely recommended the monitoring and controlling of […]

As threat increases, college cybersecurity programs are more in demand

More connected industrial workers: How are companies mitigating risk?

Learning Objectives Industrial remote workers have increased the number of remote connections. Cybersecurity risk increases with more remote connections. How are industrial companies mitigating risk? Connected workers are appearing in every industry and industrial activity. […]

Courtesy: CFE Media and Technology

How ransomware gangs leverage security compliance

Compliance regulations like the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) are created with good intentions. They aim to secure user data, ensure privacy and build trust between the companies and […]

The Biden administration expands its focus on ICS cybersecurity

The Biden administration expands its focus on ICS cybersecurity

While President Joe Biden’s July 28 executive order establishing his industrial control system (ICS) cybersecurity initiative was focused primarily on the electricity subsector, it did say that an action plan for natural gas pipelines was […]

Courtesy: CFE Media and Technology

Ron Brash Interview: Expert advice on the CVSS and OT Systems

With the rise ransomware and increasingly frequent attacks on national critical Infrastructure, the U.S. government has tried to step in with a few measures to shore up cybersecurity. These have included things like the Executive […]

How the CMMC impacts the Department of Defense supply chain

How the CMMC impacts the Department of Defense supply chain

The U.S. Department of Defense (DoD) supply chain has been under attack. This year’s ransomware events — such as the ones faced by a U.S. maritime base that brought cameras, door-access control systems and critical […]

The elevation of cybercrime to terrorism threat status

The elevation of cybercrime to terrorism threat status

Prior to the late ’90s, terrorist groups were most often viewed through the lens of law enforcement and crime, not as a national security priority. Their pursuit was led by the FBI and international police […]

ROI-minded integration decision aspects. Courtesy: Meditechsafe

Changing a network security approach

Most organizations rely heavily on security architects to vet products and assemble optimal solutions that align with security, technology, and business requirements. These technical experts spend a disproportionately large amount of energy on the integration […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Companies need to reassess their cyber physical security risk

Due to innovative business models behind ransomware-as-a-service, fundamental increase in reliance on vulnerable information technology (IT) systems by physical process controls and the evolving cyber insurance market means that every industrial organization needs to reassess […]

Bridging the cybersecurity leadership gap

Bridging the cybersecurity leadership gap

Ransomware attacks have skyrocketed in recent years. There is no sign of slowing down despite the increase in spending and risk awareness. Cybersecurity personnel often feel burned-out and relatively ineffective. They are constantly firefighting, and […]

Differences between local and international cybersecurity standards

Differences between local and international cybersecurity standards

The Federal Service for Technical and Export Control (FSTEC) is a difficult topic, but it is essential to explore in order to understand how this strict Russian regulation affects cybersecurity tool manufacturers and system integrators. […]

Courtesy: Industrial Defender

Managing cybersecurity for renewable energy resources

President Biden declared January 27, 2021 to be Climate Day, and released a set of Executive Actions to address the Climate Crisis. The strategic goal of these policies is to “lead a clean energy revolution […]

Courtesy: SecurityHQ

Machine learning, cyber kill chain analysis white paper released

Over the last few months, there has a noticeable uptick in public ransomware attacks. High-profile and often highly advanced ransomware variants, such as Egregor, Maze, REvil/Sodinokibi have been noted in almost every industry around the […]

The International Society of Automation

The International Society of Automation

The International Society of Automation (isa.org) is a non-profit professional association founded in 1945 to create a better world through automation. ISA advances technical competence by connecting the automation community to achieve operational excellence. The […]

NIST: Guide to Industrial Control Systems Cybersecurity

NIST: Guide to Industrial Control Systems Cybersecurity

Despite the threats of cyberattack on computer-controlled industrial systems, utilities and other users of these systems can be hesitant to adopt common security technologies out of concern for their impact on system performance. NIST has […]

Supply chain security advice and guidelines

Supply chain security advice and guidelines

Supply chain security is crucial as data becomes more important to a company’s success. Ten principles from the Charter of Trust and 17 baseline requirements for the supply chain are highlighted.

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES