BUSINESS > Production > Utilities


« Back to News

2018-08-14

How Hackers Target Critical Infrastructure

Cybersecurity firm uncovers methods and tools hackers use to target critical infrastructure organizations.

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

2018-07-05

Can Russian Hackers Be Stopped?

Few companies can survive a sustained assault by hackers, even fewer are prepared to defend against state-backed attacks. Is there a deterrent?

2018-06-26

German Nuclear Plant Infected With Viruses

The RWE Gundremmingen nuclear plant, located northwest of Munich, has been found to be infected with computer viruses. But don't worry....

2018-06-15

Deaths From Cyber Attacks

Attacks that cause physical harm to systems that involve critical infrastructure are an emerging challenge and the consequences could be fatal.

2018-04-17

The US Power Grid Needs Better Security

Most Americans think the US government is not doing enough to protect the electric grid from cyber attacks.Their fears appear to be justified.

2018-03-19

US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its critical infrastructure.

2018-02-28

Corporate Defence Plan Against Cyberattacks

Major industrial companies are joining up to promote stronger safeguards against assaults on digital systems that control critical infrastructure.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

Directory of Suppliers

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items

Bitium

Bitium

Bitium is a cloud-based identity platform that includes single sign-on, credential management, and analytics for midmarket and enterprise companies.

Netgear

Netgear

Netgear provide networking, storage and security solutions including Backup & Disaster Recovery and secure BYOD connectivity.

Research Institute in Automated Program Analysis and Verification

Research Institute in Automated Program Analysis and Verification

Focus of the institute is to improve cyber security by providing greater understanding, proving correctness of programs and identifying potential weaknesses of our software.

Mubaloo - IoT Security Playbook

Mubaloo - IoT Security Playbook

Mubaloo Innovation Lab has created an IoT Security Playbook, containing best practice, tips and advice for managing, securing and deploying connected devices.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risks insurance.

GardPass Cyber Security

GardPass Cyber Security

GardPass Cyber specializes in cyber security recruitment and also offers complementary services such as security assessments and advice.

OASIS

OASIS

OASIS is a nonprofit consortium that drives the development, convergence and adoption of open standards for the global information society.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Intrusion

Intrusion

Intrusion offers a portfolio of products and services that prevent and solve network issues faced by small businesses to large Fortune 500 companies as well as the federal government.

OpenLimit SignCubes

OpenLimit SignCubes

OpenLimit technologies enable people and machines globally to communicate without restrictions securely, identifiably and provably.

HudsonAnalytix - Cyber

HudsonAnalytix - Cyber

HudsonAnalytix provides leading global risk management services supporting government and commercial companies in understanding, managing and mitigating their enterprise cyber risk.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

CyberWarrior Academy (CWA)

CyberWarrior Academy (CWA)

CyberWarrior Academy is a technical training and job placement program that prepares you for a career in cybersecurity.