Canada’s Cyber Centre warns of hacktivists targeting water, energy systems
By Jim Bronskill The Canadian Centre for Cyber Security…
More results...
By Jim Bronskill The Canadian Centre for Cyber Security…
Securing complex industrial environments can seem overwhelming. However, by adopting a structured, step-by-step approach, you can build a strong defense. Read this blog to discover Cisco’s 5-step framework to help you improve your industrial cybersecur…
Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a way to make that easier. Their work introduces a container-based framework that…
Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end of their design life. Old systems, new…
In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote access points, supply chain connections, and the need for specialized sensors to…
OPINION — Ransomware attacks conducted by criminals are persistently hitting airports, schools, and 911 dispatch centers, while foreign adversaries probe our critical infrastructure every day. Yet, two programs designed to build national cyber readine…
Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the next wave…
EXPERT PERSPECTIVE — When we think about the arteries of global power, images of oil pipelines or shipping lanes often come to mind. They are visible, tangible, and easy to picture on a map. The digital world has its own arteries, equally vital but fa…
The resilience of the world’s submarine cable network is under new pressure from geopolitical tensions, supply chain risks, and slow repair processes. A new report from the Center for Cybersecurity Policy and Law outlines how governments and industry c…
The Cipher Brief’s Special Report on Nat Sec EDGE 2025The Nat Sec EDGE 2025 conference took place June 5–6, 2025 in Austin, Texas.ForewordThe 2025 Nat Sec EDGE Conference brought together a diverse coalition of leaders from government, industry, inves…