Then and Now: The State of Critical Infrastructure Security

The topic of critical infrastructure came up several times during this month’s Rocky Mountain Information Security Conference (RMISC) in Denver. And while cybersecurity certainly isn’t a cakewalk for anyone, the challenges facing critical infrastructure sectors seem especially daunting. So how did the industry get to where it is today? Where is it going from here? And most importantly, what are you supposed to do about the existing and future challenges?

Read More

Securing Water Critical Infrastructure: Detecting a Life-Threatening Attack, Part 2

In part 1 of our two-part series on securing water critical infrastructures (CI), we described how a water treatment plant’s operational technology (OT) security team quickly detected, located, and shut down contaminated water pipes during a potential chemical attack on the plant’s water. In part 2, we will describe how the security team can easily create correlated rules to alert to an attack at one of the plant’s remote locations.

Read More