BUSINESS > Production > Energy


« Back to News

2016-01-02

Industrial Control Systems Vulnerable

According to ICS-CERT some advanced networks are vulnerable to remote attackers looking to intercept communications to and from devices.

2015-12-23

Could IS Create A Cyber War?

Critical industries need to significantly ramp up their cyber security or risk having Islamic State hackers attack.

2015-11-11

Energy Under Hacktivist Threat

The FBI say that politically motivated Hackers are the second biggest threat to the U.S Energy sector, after it's own employees.

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

2015-10-14

Nuclear Facilities Have Poor Cyber Security

There is growing concern that hackers and terrorists could launch a digital attack against a civil nuclear facility.

2015-10-12

Global Nuclear Facilities 'at risk' of Cyber Attack

The civil nuclear infrastructure in most nations is not well prepared to defend against attack.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-16

Should the US Use Hidden Data to Warn Industry of Attacks?

What is government’s role in leveraging the “Dark Web” to alert private-sector organizations they’re the target for attack?

2015-09-21

Cybersecurity Is A Competition Issue For Business

Companies need to start thinking about how to measure and prepare for the real, business impacts of cyber threats.

2015-07-17

Leveraging Drones to Improve Nuclear Facility Security and Safety

Drones currently represent equal parts threat and opportunity for nuclear facilities. Opinion by Caroline Baylon

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.