BUSINESS > Production > Utilities


« Back to News

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-03-31

The EU Power Grid Is Under Attack

The organisation responsible for coordinating EU electricity markets has disclosed its IT network has been compromised in a “cyber intrusion.”

2019-10-23

Reduce Business Disruption - Make Cyber Security A Priority

Half of security experts in the manufacturing & utilities sectors surveyed say that their organisations don't invest enough in cyber security.

2019-09-16

US Power Grid Attack – No Harm Done. This Time

Hackers repeatedly attacked firewalls at multiple power generation sites operated by a "low-impact" operator but failed to cause any disruption.

2019-08-12

UK Power Outage - The Cyber Effect?

Blackout: Cities, towns, hospitals and transport networks across England and Wales lost electrical power, affecting around 1m UK citizens.

2019-07-01

US Hackers Penetrate Russia's Electric Grid

Responding to an order to go on the offensive, US Cyber Command is reported to have been busy planting malicious malware in critical infrastructure.

2019-05-13

US Electric Grid Suffers Unexplained DDoS Attack

Six weeks after the event the US DoE admits a major disruption to the electric grid involving a "denial of service condition" at an unnamed utility.

2019-04-16

America Remains Vulnerable To Cyber Attack

Ex-CIA chief issues a warning that plans to protect the electric grid distract from the real solutions that would protect US critical infrastructure.

2019-04-10

Critical Infrastructure Is Under Worldwide Attack

Every minute of the day, cyber-attacks are causing severe technology problems, disrupting and taking down different parts of the infrastructure system.

2019-03-19

Triton Malware Is Spreading

A highly sophisticated form of industrial malware capable of remotely disabling safety systems with potentially catastrophic consequences.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.