This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on…
Browsing CategoryEnergy and Utilities
Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report
Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-Force Threat Intelligence Index…
Report: Cost of a Data Breach in Energy and Utilities
On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care,…
Report: Cost of a Data Breach in Energy and Utilities
On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care,…
A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight
It’s no secret that cyberattacks against critical infrastructure are increasing. The recent attacks against water treatment plants, pipelines, vital hospital systems and food processing facilities have all made recent headlines…
Expert Interview: How to Secure Critical Infrastructure With Operational Technology
In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities…
Expert Interview: How to Secure Critical Infrastructure With Operational Technology
In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities…
Defending the Oil and Gas Industry Against Cyber Threats
The oil and gas industry is one of the most powerful financial sectors in the world, critical to global and national economies. Therefore, this industry is a valuable target for…
A Quick Guide to Using the ONG-C2M2 Model
The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools allow owners…
Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT
The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those…