When it comes to protecting critical infrastructure, the U.S. has no shortage of cybersecurity standards. Yet despite decades of regulations, from NERC CIP for energy to TSA’s pipeline directives and ...
The FBI has launched a two-month campaign, Operation Winter SHIELD (Securing Homeland Infrastructure by Enhancing Layered Defense), highlighting 10 actions organizations can use to protect against ...
Throughout any given year, the National Academies convene hundreds of conferences, workshops, symposia, forums, roundtables, and other gatherings that attract the finest minds in academia and the ...
It’s not the federal government that’s responsible for the cyber defense of critical infrastructure. The responsibility falls on the critical infrastructure operators themselves—and most aren’t ...
Federal agencies and their industry counterparts are moving at a breakneck pace to modernize in this fast-changing digital world. Artificial intelligence, automation, behavioral analytics, and ...
In recent years, cyber attacks on the nation’s critical infrastructure have been relentless. In 2025, that pattern unfortunately continues as emerging technologies such as artificial intelligence are ...
"Lawyers should anticipate advising public and private clients regarding more reporting and auditing obligations," write Day Pitney's Naju R. Lathia and Potoula P. Tournas. As lawyers, we frequently ...
We need to start treating the ability to share healthcare data easily as the next major infrastructure project—and ...
Improving trust in the cyber crime reporting process is paramount to the cyber defense of our nation’s critical infrastructure, as it allows law enforcement to disrupt and capture the criminal groups ...
Every organization relies on external critical infrastructure, such as transport, power, telecommunications etc. This section provides news and information about governmental and other measures being ...
On May 31, 2025, the Alberta Security Management for Critical Infrastructure Regulation (the Regulation) will come into force and is expected to alter existing security requirements for critical ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results