ISC East 2025 is coming up Nov. 18–20 in New York City, and the Security Industry Association (SIA) and ISC East have revealed full conference details for the SIA Education at ISC East program, including keynote presentations from leading luminaries and over 75 sessions from top industry expert speakers on the most current business trends,… The post Three Can’t-Miss Sessions on Critical Infrastructure Security at ISC East 2025 appeared first on Security Industry Association.| Security Industry Association
In the electric utility industry, safeguarding critical infrastructure is not just a technical challenge—it is a collaborative mission. As threats to the grid evolve in complexity and frequency, utility security practitioners are increasingly recognizing the value of sharing best practices, lessons learned and emerging technologies to stay ahead. Utilities are connected through a common electric… The post Strengthening the Grid: The Power of Collaboration in Utility Security appeared firs...| Security Industry Association
What the SIA Utilities Advisory Board Has Been Producing for You The Security Industry Association (SIA) Utilities Advisory Board serves as a leader in compliance and technology topics for security professionals operating within utility facilities. We are dedicated to developing recommendations and guidance for the physical security and cybersecurity of utilities infrastructure. Our work also… The post An Update for SIA Members From the Utilities Advisory Board appeared first on Security In...| Security Industry Association
Layton urged Big Tech to be held accountable and contribute to FCC programs.| Broadband Breakfast
In industrial environments, AI agents enhance human oversight, operating securely via orchestration in complex, automated environments.| Help Net Security
Learn how Xage Security enables fast, verifiable NIS2 compliance through identity-first Zero Trust access, segmentation, and tamper-proof audit logging.| Xage Security
The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems. The post Secret Service Telecom Bust Exposes Cellular Weaknesses appeared first on Purism.| Purism
On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies. The post Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene appeared first on Purism.| Purism
OT/ICS cyber threats escalate as geopolitical conflicts intensify| Help Net Security
Looking back at 2024, we recognize the immense value in revisiting some of our most impactful threat research. These articles not only offered real-time insights into pressing cybersecurity issues but also set the stage for advancements in AI-powered threat detection and defense.| MixMode
In our first blog, we outlined the challenges of NERC CIP-015-1, which mandates Internal Network Security Monitoring (INSM) within Electronic Security Perimeters (ESPs), exposing the limitations of traditional SIEM, IDS, and NTA tools in SCADA and air-gapped Sensitive Compartmented Information Facilities (SCIFs). Our second blog highlighted the need for an OT-centric approach, introducing MixMode’s Third-Wave […]| MixMode
We explore why an OT-centric approach is critical for addressing CIP-015-1’s unique demands and introduce MixMode’s Third-Wave AI, a transformative solution with origins in SCADA and mechanical engineering.| MixMode
During the first week of August 2025, the U.S. Nuclear Regulatory Commission (NRC) published Event Notification Reports documenting a wide range of nuclear-related incidents nationwide. The following events were published [...] Read the full story at CBRNE Central: U.S. NRC Radiological Incident Reports for Early August 2025.| CBRNE Central
Pacific Northwest National Laboratory (PNNL) has released a new report titled “Zero Trust Strategies for Chemical, Biological, Radiological, and Nuclear Detection Systems: D.1 Cyber Scenarios,” prepared for the U.S. Department [...] Read the full story at CBRNE Central: Zero Trust Strategies for Securing CBRN Detection Systems.| CBRNE Central
In an important international collaboration, U.S. Navy explosive ordnance disposal (EOD) technicians from Explosive Ordnance Disposal Mobile Unit 2 (EODMU-2) recently completed a joint training initiative with Panamanian EOD forces [...] Read the full story at CBRNE Central: U.S. and Panamanian EOD Teams Join Forces to Protect the Panama Canal.| CBRNE Central
Understand what OT cybersecurity is, how it differs from IT, and how to protect industrial environments from cyber threats.| TXOne Networks
The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standard CIP-015-1, effective September 2, 2025, demands a new approach to securing critical infrastructure, exposing the inadequacies of conventional methods.| MixMode
In today’s connected world, artificial intelligence (AI) is driving innovation in everything from healthcare and agriculture to threat detection and disaster response. But as systems become more reliant on sensitive, [...] Read the full story at CBRNE Central: Federated Learning for Security and Resilience: Transforming Privacy-Conscious AI in Critical Infrastructure.| CBRNE Central
My name is Josh Velazquez, and I’m the vice president of the Fence Division at SAGE Integration. At SAGE I lead high-security perimeter projects for critical infrastructure—from data centers to substations, solar farms, and more. With a degree in construction management from Bowling Green State University and over 15 years in the construction industry, I’ve… The post The Fence Perspective: Bringing Construction to Security appeared first on Security Industry Association.| Security Industry Association
Water and Wastewater Systems are increasingly becoming soft targets for sophisticated cyber attackers. A new joint fact sheet from the EPA and CISA puts this threat front and center, warning utilities about the growing risk of internet-exposed Human Machine Interfaces (HMIs).| MixMode
What IT & OT leaders must know about the NCIIPC Conformity Assessment Framework to safeguard India’s Critical Infrastructure. Prepare for CAF in 2025.| Payatu
Ransomware and malware delivered through USB devices put pressure on industrial systems, according to the Honeywell 2025 Cyber Threat Report.| Help Net Security
China’s state-sponsored cyber operations, driven by groups like Volt Typhoon, Salt Typhoon, Brass Typhoon, and APT41, and amplified by techniques like Fast Flux DNS, are not chasing Hollywood apocalypse—they’re seizing America’s networks, turning our infrastructure into a weapon against us.| MixMode
In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform.| MixMode
Operational Technology (OT) networks and Industrial Control Systems, the backbone of critical infrastructure, have traditionally operated in isolation and designed more for reliability and efficiency than security. The increasing convergence of IT and OT systems, driven by digital transformation and the Internet of Things (IoT), promises to revolutionize industries from…| MixMode
Governor Greg Abbott has issued a ban on Chinese AI and social media apps, including DeepSeek, citing cybersecurity risks and potential threats to state infrastructure.| WinBuzzer
Ransomware and extortion incidents increased in 2023, creating a global crisis. 5,000 ransomware victims were detected across social channels.| Help Net Security
The Biden administration is looking to understand just how widespread open-source software is in critical infrastructure.| CyberScoop
CISA Director Jen Easterly says the CrowdStrike-linked outage serves as a “dress rehearsal” for what China may have planned for U.S. critical infrastructure.| CyberScoop
Industry representatives in a House hearing pointed to the Biden administration’s cyber reporting mandate as an example of overlapping regulations.| CyberScoop
The attack is the latest in a string targeting Ukrainian critical infrastructure and illustrates the growing ease of targeting industrial systems.| CyberScoop
A new document from CISA guides local governments and the private sector on how to improve the resiliency of critical infrastructure.| StateScoop
A guide to using cybersecurity metrics and Security Key Performance Indicators (SKPI) to measurably develop OT security maturity levels.| TXOne Networks
Open source is people and people are open source. Duane O’Brien talks about what he’s learned about supporting, connecting with, and caring for the critical human infrastructure of open source.| Open Source Stories