|

IT


Zero Trust: Protecting Critical Infrastructure and Responding to CISA’s ‘Shields Up’

There are no boundaries in cyberspace. That fact has accelerated sharing of threat intelligence across the defenders, but it exponentially raises the threat of cyberattacks. This reality is underscored by…


Implement Cost-Effective, Zero-Trust Remote Operations to Mitigate Cyber Risks and Maintain Operational Resilience
cybersecurity

In January 2021, a hacker accessed the digital infrastructure controlling the water supply for Oldsmar, a Florida city of 15,000 people. The bad actor attempted to manipulate the city’s water…


Three Things Utility Companies Need to Do to Prevent the Next Cyberattack
cybersecurity

For the better part of the past decade, utility companies have been more concerned with the potential for outages than cyberattacks, but this has changed over the past several months.…


Two Keys for Better Critical Infrastructure Cybersecurity

Two recent incidents have made the cost of not protecting our infrastructure and natural resources abundantly clear. First, there was the widely publicized SolarWinds attack that infected more than a…


5 Cybersecurity Best Practices to Protect Your OT Systems
cybersecurity

Over the last several years, cyber actors and online criminal gangs have used cyber warfare to disrupt business and infrastructure across the globe. Today, they are becoming even more aggressive…