These are some great insights from Kshemendra Paul, U.S. Department of Energy (DOE) Assistant Inspector General for Cyber Assesments and Data Analytics, on the impact of data in the federal government. "It’s time to strengthen the use of data, evidence and transparency to stop driving with mud on the windshield," he writes. A really worthy read at Federal News Network: https://lnkd.in/dWqKwbwJ #data #governance #federalgovernment #govcon #commentary
Ezekiel Russell’s Post
More Relevant Posts
-
Amid rising threats to operational systems and a chaotic geopolitical environment, electric utilities want Congress to cleanly reauthorize the Cybersecurity Information Sharing Act of 2015, which allows for greater information sharing between the power sector and federal government. The law lapsed October 1. A temporary extension was included in the government funding bill, which failed and resulted in the current shutdown. A bipartisan Senate bill could bring CISA’s protections back into force. It is vital that utilities are able to share threat information as the risks are rising, said Kristine Martz, a principal product advisor at cybersecurity firm Dragos. “Adversaries are becoming aware of the impact that they can achieve against easy to access industrial control systems,” or ICS, she said Friday at a conference hosted by Columbia University’s School of International and Public Affairs. https://lnkd.in/ew5wurYT
As cyber threats grow, utilities say lapsed information-sharing law stymies security utilitydive.com To view or add a comment, sign in
-
What if a single cyberattack could shut down hospitals, trains, and banks across the United Kingdom? That is the reality my PhD research is uncovering about the electric power grid. Even one cyberattack could cascade across multiple sectors, disrupting critical services and affecting millions of people every day. Recent reports show that cyberattacks targeting energy infrastructure have increased by over 150 percent in the past five years, demonstrating just how urgent this issue has become. At the same time, being a Black male in cybersecurity has taught me that protecting critical infrastructure is not just about technology, it is about perspective. Diverse voices uncover blind spots that might otherwise go unnoticed. Increasing representation in cybersecurity is not simply a matter of fairness; it is essential for keeping our systems safe. I would love to hear your thoughts: If you were responsible for securing the United Kingdom’s power grid, what would be your top priority? And how can diversity in cybersecurity help address these challenges? Let us share insights, strategies, and experiences. The security of our future depends on both innovation and inclusion. #PhD #CyberSecurity #CriticalInfrastructure #UK #CyberTerrorism #DiversityInTech #EnergySecurity #Research #RepresentationMatters
To view or add a comment, sign in
-
In System Failure cybersecurity expert Chip Harris exposes the hidden cyber war that is threating the infrastructure that we all rely on daily. With gripping case studies and near-disasters. he reviles how hackers, rouge states, and criminal networks are targeting our most vital systems - risking blackouts, explosions, and economic chaos. Part exposé , part urgent warning, System Failure is a wake-up call for anyone who takes electricity , water or fuel for granted. Power grids, oil refineries, and ater systems. These are not just utilities - they are the lifelines.....and they are under attack. https://lnkd.in/eNiKfFwK
To view or add a comment, sign in
-
-
"Cyberattacks by the nation’s adversaries have increasingly targeted broader swaths of American communications and public infrastructure. But even as more sophisticated threats emerge, the Trump administration’s cuts to federal programs have eroded U.S. cyberspace defenses, according to a senator and a nonprofit organization that advocates improved security. “I would call it almost an across-the-board retreat from the national security defenses that we built up over the past five years, at the same time that the threat is only increasing and accelerating,” said Senator Angus King, a Maine independent who caucuses with Democrats." "The weakening of the defenses has multiple causes. Mr. Trump has been hostile to the cybersecurity agency ever since its former director, Chris Krebs, said the 2020 election, which Mr. Trump lost, was secure." "Trump Administration Cuts Cyberdefense Even as Threats Grow China has penetrated networks that control infrastructure systems and has hacked telecommunications companies." https://lnkd.in/eqi-MErX
To view or add a comment, sign in
-
The new arms race is invisible until it isn’t: nation-state hackers are quietly pre-positioning in power grids, telecom backbones, and ports—then the lights flicker, the trains halt, and markets move. 🛰️⚡ In August, 13 governments warned PRC-linked actors are still targeting critical infrastructure. In January, the U.S. wiped PlugX malware tied to China from thousands of systems—proof that “left-of-boom” access is real. Policy is catching up: Washington sanctioned a Beijing firm over alleged hacks, while Russia’s renewed strikes on Ukraine’s energy system underscore how cyber and kinetic now interlock. Takeaway: rehearse incident playbooks, map OT/IT dependencies, verify detection in supplier networks, and pre-agree crisis comms. 🔒 🤔 If a state actor were already inside your environment, which single control would you harden by tomorrow—and why? Sources [1] https://lnkd.in/dfZQzJVB [2] https://lnkd.in/dRVBh7fT [3] https://lnkd.in/dRqYTfxN [4] https://lnkd.in/dZA26Qmi #CyberSecurity #Geopolitics #CriticalInfrastructure This post was generated by my custom-built personal agent, powered by LLMs and designed to operate my computer. If you're curious about how it works, feel free to ask!
To view or add a comment, sign in
-
When Convenience (Control) Becomes a National Security Risk Just days after I wrote “it all started with a sandwich label, the headlines broke: “Russian hackers steal files from eight MoD bases and post them on the dark web.” Four terabytes of data. Eight defence bases. Contractor emails, staff names, even nuclear related documents, gone. Described as a “catastrophic” breach, (understatement) this is a costly reminder that our greatest vulnerabilities are often hidden in plain sight. The Dodd Group was not the Ministry of Defence. It was a maintenance contractor, one of thousands connected through a vast digital supply chain. That chain promises efficiency. Instead, it is becoming the perfect entry point for exploitation. We have centralised data faster than we have secured it. We have demanded traceability before accountability. And now we are told digital ID will make everything safer. Really? When even the most protected systems on earth cannot keep their walls intact? Technology is not the enemy. Complacency is. When systems interconnect without clear governance, the failure of one becomes the failure of all. If a single contractor can open the door to eight military bases, imagine what a global digital identity could expose. Convenience always comes first. Control always follows. #DigitalID #DataProtection #Privacy #Governance #CyberSecurity #EthicsInTech #DigitalTrust #CivilLiberties #CarbonTracking #NationalSecurity #SupplyChainRisk #AI #Hamsters
To view or add a comment, sign in
-
-
A report seen exclusively by The Independent shows that more than 700 email addresses and corresponding passwords from across nine government domains have been leaked online in the past year, creating fears that taxpayers’ sensitive data, or “critical systems” such as power grids, could be targeted by hackers. There have also been nine attempts to sell classified UK military and Nato-related documents to “bad actors” – which experts warn could “directly undermine national security”. https://lnkd.in/e29qZXwb
To view or add a comment, sign in
-
"Today, a new generation of commercial actors has emerged, selling capabilities that rival and sometimes surpass state-level cyber tools. The instruments of modern surveillance—spyware, hack-for-hire services, and ad-based tracking—are far more surgical and sophisticated, and they are no longer confined to intelligence agencies. A global “cyber-mercenary” industry now sells these tools to governments, militaries, and private actors to monitor or track targeted individuals, networks, and populations with alarming precision and efficiency."
The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats https://www.justsecurity.org To view or add a comment, sign in
-
The U.S. Secret Service dismantled a massive hidden telecom network in New York. Investigators uncovered more than 100,000 SIM cards and 300 servers capable of disrupting emergency communications, shutting down cellular service, and enabling encrypted coordination between nation-states and criminal groups. The scale and sophistication of this operation highlight how mobile networks are now a prime target for adversaries seeking to disrupt critical infrastructure and public safety. With foreign threat groups increasingly embedding themselves in telecom systems, securing mobile connectivity has become as vital as protecting power grids or water systems. Learn more about why mobile networks must be treated as critical infrastructure and what layered defenses are required to safeguard public safety: https://buff.ly/J5JNldm #CyberSecurity #CriticalInfrastructure #TelecomSecurity #NationalSecurity
To view or add a comment, sign in
Thank you for reposting.