Cyber Attacks and Critical Infrastructure

February 9, 2016

Over the past several years, there has been intense focus by governments and industry on the potential for cyber attacks on critical infrastructure. Recent events show us that the focus is essential. What is “critical infrastructure?” In his February 12, 2013, Executive Order—Improving Critical Infrastructure Cybersecurity, 1 President Obama borrowed a definition from the USA Patriot Act of 2001, stating that it is “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” This would include such things as telecommunications systems, public health systems, transportation systems, power generation and delivery, water supply, financial services, food production and distribution, government, and public safety.

Spotlight

Caspida

Caspida is a real-time cyber-security and threat detection company that automatically detects & prevents hidden threats across corporate, SaaS/cloud and mobile environments. We detect the entire cyber threat kill chain and are the first in the industry to provide coverage for unknown threats that have already penetrated the enterprise, without rules, signatures, sand-boxing or human analysis. We find lurking APTs, new malware and unpredictable insider threats using a novel behavioral threat detection and Big Data security analytics approach.

OTHER WHITEPAPERS
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

Check The Locks

whitePaper | October 4, 2022

Organizations have invested millions towards improved information security since the start of the pandemic, which galvanized a worldwide explosion of cybercrime. C-suites are increasingly recognizing cybersecurity as a business risk, viewing its necessity as more than just an IT problem.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More
news image

Pulumi Cloud Security Whitepaper

whitePaper | October 24, 2022

Pulumi is a venture-backed cloud computing company in Seattle, WA, founded by industry veterans with decades of experience creating and operating Enterprise software at companies like Microsoft, Amazon, and Google. Pulumi’s user base includes companies of all shapes and sizes, including ISVs, SIs, and Fortune 500s.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More

Spotlight

Caspida

Caspida is a real-time cyber-security and threat detection company that automatically detects & prevents hidden threats across corporate, SaaS/cloud and mobile environments. We detect the entire cyber threat kill chain and are the first in the industry to provide coverage for unknown threats that have already penetrated the enterprise, without rules, signatures, sand-boxing or human analysis. We find lurking APTs, new malware and unpredictable insider threats using a novel behavioral threat detection and Big Data security analytics approach.

Events