During the course of 2020, the United States government came under attack in one of the world’s biggest-ever security breaches. Cyber-criminals gained access to a number of federal agencies, including the Treasury and...
An organization’s legal responsibilities have always depended on its geographical location or, sometimes, the geographical origins of the data, but the world is becoming a smaller place. The European Union’s General Data...
Half of the manufacturing companies that took part in a recent survey in the US admitted they had suffered a data breach or cyber attack in the previous 12 months. Unfortunately, such attacks are part of a growing global...
Cyber attacks on civil nuclear power plants (NPPs) would have devastating consequences for a country relying, even in part, on nuclear energy. It could affect the entire power network, might cause the release of...
Mitigating risk and anticipating attack vulnerabilities on utility grids and systems are not just about installing technology, but also about understanding risk.
As more and more objects are connected, communicate and interact with each other, in what is labelled the internet of things (IoT), they become building blocks in larger systems. Known and unknown vulnerabilities in this...
Imagine someone who hasn’t driven a car in the past 30 years. Taking the wheel of a modern car today, this person would probably be lost trying to figure out all the electronics inside. Voice command, self-driving cars...