A recently published paper from three George Washington University students refutes a commonly cited statistic about ownership of critical infrastructure and offers a more accurate portrayal of public and private ownership.
Latest in Critical infrastructure
The two TSA mandatory directives are a welcome step to ensure that pipeline owners and operators implement the basic safeguards required to repel cyberattacks. Yet certain weaknesses in the current approach need to be acknowledged.
The new reporting mandate is designed to encourage compliance with the law and increase the quantity and quality of cyber incident reporting
Many federal agencies have existing authority that could be leveraged to improve the cybersecurity of private actors under their jurisdiction.
The U.S. government does not have a reliable method to identify, support, and secure the most “critical of critical” infrastructure. But, the Cyberspace Solarium Commission’s 2020 report addresses just that.
A commonly cited statistic about private ownership of U.S. infrastructure has popped up again after the Colonial Pipeline ransomware report. But where does it actually come from?
We need to treat the cloud computing sector like the critical infrastructure it has become.
Most deferred maintenance issues in infrastructure translate only into local health and economic problems, but there are serious national security ramifications associated with decaying infrastructure.
The Daily Beast has a story on “CrashOverride”, a computer program best described as transient anti-infrastructure warhead designed to disrupt the power grid. It was tested live against a Ukrainian substation in December 2016 creating a small blackout.
Recently, Tim Maurer, Ariel Levite, and George Perkovich of the Carnegie Endowment for International Peace released a white-paper with a broad new proposal regarding the offensive cyber operations conducted by nation states, in an attempt to address acknowledged interdependent risk issues within the global financial system.