BUSINESS > Production > Utilities


« Back to News

2022-11-28

Hidden In Plain Sight

Control system cyber incidents are more numerous & damaging than you might expect - more than 17 million resulting in 34,000 deaths. By Joe Weiss

2022-11-07

Japan Will Use AI To Secure Critical Infrastructure

Risk Based Maintenance: Using cloud-hosted SaaS software based on a decentralized database and distributed ledger technology.

2022-10-10

Hacktivist Group GhostSec Attack Israel

#OpIsrael Update: A hacking group easily breached programmable logic control systems via the Internet, exploiting weak access credentials.

2022-07-15

Suspicions That Explosion At US Gas Export Terminal Caused By Russian Hackers

Was the Freeport Liquified Natural Gas explosion that forced Europe to keep buying Russian gas a Control System cyber attack? By Joe Weiss

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-03-18

Convergence & Digitalisation Create Problems For Energy Utilities

The convergence of previously separate sectors around renewable smart grids is eroding control over energy cyber security. By Steven O’Sullivan

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2021-11-22

Wind Turbine Maker Shuts Down Computer Systems

One of the world’s largest wind turbine makers has suffered a 'cyber security incident' forcing it to shut down IT systems across multiple locations.

2021-11-03

The Smart Cities Revolution

Smart solutions can reduce crime, improve healthcare, reduce energy consumption and reduce environmental impact. So what's the problem?

2021-08-03

TeamViewer Remote Control App Gets A Security Upgrade

TeamViewer's remote control app can be locked with biometric authentication preventing unauthorised use, even if the device is unlocked.

2021-08-04

Cyber Security Standards For Critical Infrastructure

The White House issues a national security memo instructing CISA & NIST to establish cyber security performance goals for critical infrastructure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.