BUSINESS > Production > Utilities


« Back to News

2019-08-12

UK Power Outage - The Cyber Effect?

Blackout: Cities, towns, hospitals and transport networks across England and Wales lost electrical power, affecting around 1m UK citizens.

2019-07-01

US Hackers Penetrate Russia's Electric Grid

Responding to an order to go on the offensive, US Cyber Command is reported to have been busy planting malicious malware in critical infrastructure.

2019-05-13

US Electric Grid Suffers Unexplained DDoS Attack

Six weeks after the event the US DoE admits a major disruption to the electric grid involving a "denial of service condition" at an unnamed utility.

2019-04-16

America Remains Vulnerable To Cyber Attack

Ex-CIA chief issues a warning that plans to protect the electric grid distract from the real solutions that would protect US critical infrastructure.

2019-04-10

Critical Infrastructure Is Under Worldwide Attack

Every minute of the day, cyber-attacks are causing severe technology problems, disrupting and taking down different parts of the infrastructure system.

2019-03-19

Triton Malware Is Spreading

A highly sophisticated form of industrial malware capable of remotely disabling safety systems with potentially catastrophic consequences.

2019-02-19

Utility Week Cyber Security & Resilience Conference

12 March 2019 | London. The only UK event bringing together resilience, risk, cyber & IT security executives from the utility sector.

2018-12-10

PAS Global Named Leader In Industrial Control Systems Cyber Market

PAS Global named the Frost & Sullivan 2018 North American Technology Innovation Award winner for its ICS cybersecurity software.

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

Perimeter 81

Directory of Suppliers

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

E-core

E-core

e-Core offers the highest quality standards in offsite software development, quality assurance, and application support services

Alliance for Cyber Security

Alliance for Cyber Security

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Block Blox

Block Blox

Block Blox is a blockchain consulting company. Services include Smart Contract & Infrastructure Security Audits, Security Token Issuance and Regulatory Compliance Support.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

ISA Cybersecurity

ISA Cybersecurity

ISA is Canada's leading cybersecurity-focused company, with nearly three decades of experience delivering cybersecurity services and people you can trust.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.