#infrastructure-protection

[ follow ]
#cisa
SF politics
fromNextgov.com
2 hours ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
SF politics
fromNextgov.com
2 hours ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
London
fromArchDaily
15 hours ago

Beyond the Street: Climate, Commerce, and the Evolution of Hong Kong's Elevated Networks

Hong Kong's elevated urbanism enhances connectivity but raises concerns about accessibility and the neglect of ground-level public life.
Artificial intelligence
fromFortune
4 hours ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
DevOps
fromInfoWorld
10 hours ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
#ransomware
Healthcare
fromSecuritymagazine
1 day ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Healthcare
fromSecuritymagazine
1 day ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
UK politics
fromComputerWeekly.com
3 days ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
#architecture
Design
fromArchDaily
2 days ago

What Lies Beneath: 10 Projects Reshaping the Ground Level

Architecture's pursuit of lightness often leads to fragmented public spaces rather than continuous, accessible ground areas.
Design
fromArchDaily
3 days ago

Mapping the Technosphere: Architecture as an Interface Between Systems and Territories

Architecture must be viewed as interconnected with technical networks that support modern life, requiring new approaches and understandings.
Women in technology
fromInfoQ
3 weeks ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
Design
fromArchDaily
2 days ago

What Lies Beneath: 10 Projects Reshaping the Ground Level

Architecture's pursuit of lightness often leads to fragmented public spaces rather than continuous, accessible ground areas.
Design
fromArchDaily
3 days ago

Mapping the Technosphere: Architecture as an Interface Between Systems and Territories

Architecture must be viewed as interconnected with technical networks that support modern life, requiring new approaches and understandings.
Women in technology
fromInfoQ
3 weeks ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
Europe news
fromArchDaily
2 days ago

Reimagining the Complete Neighborhood through Urban Renaturing

ReGreeneration project aims to transform European cities to remain livable amid climate change.
Washington DC
fromNextgov.com
2 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
Data science
fromComputerWeekly.com
2 days ago

Ordnance Survey works with Snowflake to tackle flood risk | Computer Weekly

Intelligent Flood Readiness model identifies 1.2 million people in England at risk of flooding, focusing on vulnerable areas for policymaking.
NYC real estate
fromStreetsblog New York City
2 days ago

Ask An Insurance Industry Insider: Safe Streets Are The Best Way To Bring Down Insurance Costs - Streetsblog New York City

Personal injury lawyers and insurance companies dominate advertising, reflecting a complex system of risk assessment and cost management in insurance.
#cybersecurity
fromTechCrunch
2 hours ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Information security
fromNextgov.com
2 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Higher education
fromNextgov.com
3 days ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Silicon Valley
fromWIRED
4 days ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
1 week ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromTechCrunch
2 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromNextgov.com
2 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Marketing
fromEntrepreneur
3 days ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
fromAdirondack Almanack
4 days ago

NYSDOT announces recognition for emergency bridge projects

"This recognition is a testament to the talent, dedication, and 'can-do' spirit of the professional staff on the NYS Department of Transportation's team," Commissioner Dominguez said. "From bridge strikes in the capital region to catastrophic flooding in the Adirondacks, our team members work tirelessly to restore traffic and critical infrastructure-safely and quickly-with modern and resilient structures along these vital corridors within New York State."
Brooklyn
London startup
fromComputerWeekly.com
4 days ago

Datacentre developers tout benefits to local communities, but do they deliver? | Computer Weekly

Datacentre developments are causing challenges for local businesses, raising concerns about energy consumption and community impact despite potential local benefits.
Business intelligence
fromTechzine Global
4 days ago

AI deployment in networks is stalling as pressure on infrastructure mounts

AI adoption in network environments is slower than expected, with increasing infrastructure demands and significant challenges in deployment and integration.
New York City
fromStreetsblog New York City
4 days ago

Monday's Headlines: A Century of Days Edition - Streetsblog New York City

Mayor Mamdani's 100th day in office included commitments to waste containerization and a city-owned grocery store, while addressing misconceptions about his governance style.
NYC politics
fromStreetsblog New York City
4 days ago

Push Grows To Move Parking Enforcement From NYPD To DOT - Streetsblog New York City

Local community boards are pushing for the Department of Transportation to regain authority over parking enforcement from the NYPD due to inadequate enforcement.
fromTheoldguybicycleblog
6 days ago

Cycling Safety at Intersections: My Rule for When the Driver Has a Stop Sign

The windows are so dark now, I can't see anything inside. No more eye contact. No more silent acknowledgment that I exist.
Bicycling
Digital life
fromEarth911
1 week ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
SF politics
fromStreetsblog USA
3 days ago

"Why Do We Do This Bill?": Preparing Congressional Staff for Surface Transportation Reauthorization - Streetsblog USA

Federal surface transportation reauthorization lacks institutional knowledge, leading to skepticism about its effectiveness and the need for reevaluation.
Europe news
fromwww.dw.com
3 days ago

The world ditched wasteful toilets, the US stayed behind

Toilet flushing methods in the US and Europe differ significantly, impacting water conservation efforts amid increasing water scarcity concerns.
DevOps
fromTechzine Global
4 days ago

Cloudflare introduces new features for building and deploying agents

Cloudflare is transforming AI development with Dynamic Workers, Sandboxes, and Artifacts for secure, scalable, and efficient code execution.
New York City
fromInsideHook
5 days ago

Can Self-Driving Cars Help Fix the Nation's Potholes?

Pothole repairs are gaining attention, with NYC filling 100,000 potholes and Waymo partnering with Waze to identify potholes using autonomous vehicles.
#malware
Information security
fromSecurityWeek
11 hours ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
2 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Information security
fromSecurityWeek
11 hours ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
2 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
#ai
Information security
fromSecurityWeek
3 days ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Artificial intelligence
fromFast Company
6 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromSecurityWeek
3 days ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromTechzine Global
3 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Podcast
fromSecuritymagazine
3 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
World politics
fromThe Cipher Brief
3 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
Information security
fromSecurityWeek
1 day ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
#ics-security
Information security
fromSecurityWeek
2 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromSecurityWeek
2 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromSecurityWeek
2 days ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Miscellaneous
fromComputerWeekly.com
1 month ago

Render Networks unveils synchronised agentic critical infrastructure architecture | Computer Weekly

Render Networks expands ClearWay platform to automate critical infrastructure deployment, reducing capital risk through real-time field verification and audit-grade accountability across complex multi-asset projects.
US politics
fromFortune
1 month ago

Pentagon officially defines Anthropic as 'supply chain risk' | Fortune

The Trump administration designated Anthropic as a supply chain risk, forcing government contractors to stop using Claude AI due to national security concerns over surveillance and autonomous weapons capabilities.
Information security
fromSecuritymagazine
2 days ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
fromwww.businessinsider.com
3 days ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
Gadgets
fromNextgov.com
2 months ago

When every second counts: government tech helps first responders' lifesaving missions

Indoor-capable drones and indoor location-tracking technologies significantly improve first responder situational awareness and reduce risk in hazardous interior environments.
California
fromPadailypost
1 month ago

Guards may watch tracks to prevent deaths

Palo Alto plans to hire Orion Security guards to monitor Caltrain crossings 24/7 to prevent teen suicides under a $1.7 million city–school district funded contract.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
US news
fromAol
2 months ago

10 U.S. Bridges That Engineers Say Are "Structurally Deficient"

Ten heavily trafficked U.S. bridges are structurally deficient or functionally obsolete and require prioritized repairs or replacement despite remaining open.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
US politics
fromNextgov.com
2 months ago

Tech Bills of the Week: Measures seek to boost cyber posture of utilities

Congressional bills empower the Energy Department to strengthen physical and cyber security of pipelines, LNG facilities, and smaller electric utilities with grants and coordination.
Gadgets
fromArchitectural Digest
1 month ago

The Spectrum of Home Security Today-From Sensors to Safe Rooms

Modern home security uses discreet, AI-enabled sensors, cloud storage, and professional integrations, making devices critical for evidence and design-integrated protection.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromArchitectural Digest
2 months ago

Designing When Your City Is Under Siege

Life doesn't pause for grief or fear. You might be going through something devastating but you're still packing lunches, still driving your kids to baseball practice, still showing up to work. One minute I find myself prepping for a whole home presentation and the next minute I'm checking the news, hoping and praying that no one has been killed on the streets today.
Design
fromComputerworld
2 weeks ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromThe Cipher Brief
4 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromTechRepublic
1 month ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromComputerworld
2 months ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
#cyberwarfare
Information security
fromNextgov.com
2 months ago

NIST releases a new draft cybersecurity framework for systems that never stop moving

Transportation cybersecurity lags behind other critical infrastructure sectors, creating evacuation and public-safety risks as transit systems become more digitalized.
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
[ Load more ]