The global critical infrastructure protection market has been witnessing steady growth due to increasing threats to vital infrastructure and the rising ...
Are the ducks finally lining up on cybersecurity? The recent memorandum of agreement between the departments of Defense and Homeland Security, who for years have been butting heads on cybersecurity ...
Whether at the national or local level, the core of advancing critical infrastructure security and resilience lies in adopting a risk management approach. This approach identifies which infrastructure ...
The U.S. infrastructure landscape is vast and complex: roughly 85% of the critical infrastructure in the country is owned and operated by the private sector, while the public sector provides ...
Asking a cross-sectional group of officials to define “critical infrastructure” would be like asking the group to close their eyes, think of a dog, and describe what they saw. We would end up with ...
Whether they’re turning on the lights, running the faucet or commuting to the office, citizens expect power, clean water, transportation services and other critical infrastructure to work every day.
The article has been revised on July 22 to more accurately reflect the opinions of the author. The Security Bureau of the Hong Kong government revealed the details of the long-awaited proposed ...
Leaders across government and industry are confronting a hard truth: The attack surface for critical infrastructure security has expanded as aging systems have been retrofitted with networked ...
Every day, Americans rely on critical infrastructure to power our daily lives whether we realize it or not. From the energy that heats our homes and keeps the lights on, to the water that we drink, ...
The problem of the destructive effects of high-altitude electromagnetic pulse (EMP) on electronic and electrical equipment has been well-known for more than 50 years. All military equipment and ...
The new level of cooperation between the Homeland Security and Defense departments could be a positive development for cybersecurity, writes blogger Brian Robinson. But other signs are less ...