A new analysis from the Foundation for Defense of Democracies (FDD) warns that Chinese-produced cellular modules, embedded across… The post
A new analysis from the Foundation for Defense of Democracies (FDD) warns that Chinese-produced cellular modules, embedded across… The post
Exposure management company Tenable announced a new OT asset discovery engine that enables security teams to quickly bring… The post
Asset intelligence platform for unified security operations and exposure management vendor Axonius announced on Wednesday a major expansion… The post
New data from GuidePoint Security highlights a ransomware landscape that is no longer spiking but settling into a… The post
A Demokráciák Védelméért Alapítvány (FDD) új elemzése arra figyelmeztet, hogy a kínai gyártású mobilhálózati modulok tömeges jelenléte az amerikai kritikus
The Information Technology Industry Council (ITIC) warns that the U.S. is entering a decisive phase in its pursuit… The post
In January 2026, a technical incident occurred in Estonia during testing of the new 100MW Hertz 1 (Kiisa) battery energy
In thinking about 29 December 2025 cyber-attack on part of the power grid in Poland one issue at once comes
Cybersecurity policies require that cyber incidents be identified as such. Cyber incident response plans are then initiated after incidents are
Network cybersecurity (IT and OT) and control system organizations have fundamentally different objectives and criteria when it comes to identifying
Network cybersecurity (IT and OT) and control system organizations have fundamentally different objectives and criteria when it comes to identifying
New proposal appears for better incident evaluation and reporting – without the inflation. In following the various ICS cyber incidents
In 1998 I was the director of the Defence Policy and Planning Department of the Ministry of National Defence, Republic
May 7, 2026, I will be speaking on process sensor cybersecurity at Sensors Converge in Santa Clara, CA (https://www.sensorsconverge.com/). Process
I have shared my impressions of the CRA before in writing[1] and was surprised to hear that a Draft Guide
Cyber-physical systems (CPS) protection company Claroty announced on Tuesday new Visibility Orchestration capabilities in its Saas offering Claroty… The post
New research from Dataminr detailed that a pro-Iranian threat actor known as Ababil of Minab has claimed responsibility… The post
Ransomware surged across the manufacturing sector in 2025, rising 56% year over year to 1,466 incidents and accounting… The post
New analysis from Marlink marks the emergence of Black Shrantac as a rapidly evolving ransomware group that has… The post
The U.S. Environmental Protection Agency is seeking FY 2027 budget authority to expand its Drinking Water Infrastructure Resilience… The post
New data from Black & Veatch-Takepoint Research finds a persistent execution gap in the manner cybersecurity is integrated… The post
The U.S. National Institute of Standards and Technology (NIST), through its NIST Information Technology Laboratory (ITL), is supporting… The post
On April 1, 2026, Dr. Darrell Eilts, CIO of the Sewage and Water Board of New Orleans, and I will
The U.S. Department of Energy’s FY 2027 budget frames cybersecurity as a core pillar of national energy security,… The post
U.S. cybersecurity agencies on Tuesday warned of ongoing cyber exploitation of internet-connected OT (operational technology) devices, including programmable… The post