BUSINESS > Production > Utilities


« Back to News

2018-06-26

German Nuclear Plant Infected With Viruses

The RWE Gundremmingen nuclear plant, located northwest of Munich, has been found to be infected with computer viruses. But don't worry....

2018-06-15

Deaths From Cyber Attacks

Attacks that cause physical harm to systems that involve critical infrastructure are an emerging challenge and the consequences could be fatal.

2018-04-17

The US Power Grid Needs Better Security

Most Americans think the US government is not doing enough to protect the electric grid from cyber attacks.Their fears appear to be justified.

2018-03-19

US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its critical infrastructure.

2018-02-28

Corporate Defence Plan Against Cyberattacks

Major industrial companies are joining up to promote stronger safeguards against assaults on digital systems that control critical infrastructure.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-09-27

Dragonfly Threat: Hackers Will Sabotage Power Grids

The experts at Symantec say a hacking campaign is underway, targeting the energy sector in Europe and the US to sabotage national power grids.

2017-08-14

The US Power Generation System Is Under Siege

A remote substation working through a control system not connected via the Internet has less security than a power plant & is often an entry point.

2017-07-20

Russia Suspected As Hackers Breach Power Plant Systems

Hackers working for a foreign government have breached at least a dozen US power plants, searching for vulnerabilities in the electrical grid.

2017-07-13

Hackers Attempt To Penetrate US Nuclear Plants

The US government is warning industrial firms about hacking activity targeting the nuclear and energy sectors.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.