article thumbnail

Keep the Water Flowing for the DoD: Securing Operational Technology from Cyberattacks

Tenable

In addition to being attractive targets, these systems are frequently older, lack modern cybersecurity controls and include a range of interconnected systems and technology. They rely on a range of technologies, including programmable logic controllers (PLC) to control various stages of water treatment.

article thumbnail

CIOs Discover That Dumb Technology Can’t Always Be Upgraded

The Accidental Successful CIO

Sometimes it is not wise to marry smart technology with dumb machines Image Credit: wild trees. As CIO we are always trying to move our companies forward because we understand the importance of information technology. We’ll try to marry modern technology to older equipment in order to extend its life and avoid replacement costs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical infrastructure is more vulnerable than ever—your industry could be a prime target

Lacework

The malware infected the industrial control systems that were used to operate the plant, which then caused some of the machinery to spin too quickly and severely damage and destroy itself. . For the first time, malware was used to cause physical damage. Stuxnet is a computer worm that was used to attack a nuclear power plant in Iran.

article thumbnail

Radar trends to watch: December 2021

O'Reilly Media - Ideas

Facebook will stop using facial recognition technology and is deleting its face database, although it is keeping the model trained on that database. The Trojan Source vulnerability uses Unicode’s ability to handle bi-directional text to hide malware directly in the source code, where it is invisible. Cryptocurrency.

Trends 89
article thumbnail

Landmark EU Law Strengthens Cybersecurity of Critical Infrastructures

Palo Alto Networks

NIS2 introduces the potential of fines for the first time, and has an array of new provisions encouraging Member States to promote leading technologies and approaches to counter increasingly sophisticated and automated cyberattacks. Promoting Technologies and Approaches to Counter Cyber Adversaries.

article thumbnail

Ransomware: The Present We Deserve?

Haft of the Spear

The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Hate the players not the technology. we should not be attacking technology. [5]. history and “the biggest public health crisis from a chemical poisoning in the history of the country.”

Fashion 75
article thumbnail

Hybrid Work: Benefits, Disadvantages and Other Considerations

Kaseya

Introducing a hybrid work culture is an attempt at revamping the traditional work culture to achieve both employee satisfaction and an optimal work environment by leveraging the right technology and resources. For example, Dow Chemical saved over 30% in non-real estate costs after transitioning to a remote workforce.