Security Insights

Security Insights

Putting security in focus

  • Home
  • About Security Insights
  • Guest bookings
  • Contacts

CNI

podcast

IT, OT, and CNI: a hidden threat?

July 19, 2024 admin

Advanced economies now rely heavily on their IT infrastructure, as recent events have shown only too clearly. We are probably fortunate that the incident that grounded flights and stopped card payments around the world was […]

podcast

Critical National Infrastructure: changing threats, a changing response

March 7, 2024 admin

Critical national infrastructure is constantly under attack, from an ever greater range of threat actors. Not all the attacks are reported, of course, and governments and businesses go to great lengths to protect their systems, […]

Fiber network cables
podcast

CNI, healthcare and cyber threats

May 11, 2023 admin

Any system that is connected to the public internet is at risk of cyber attack. This poses dilemmas for operators of critical infrastructure, or CNI.  Many of the devices and applications that run critical services […]

Featured Post

Critical infrastructure, cyber threats, and lessons from Ukraine

January 18, 2023 admin

In this episode we look at the continuing threats to critical national infrastructure, or CNI. National infrastructure is under attack from both nation state actors, and from ransomware gangs and other crime groups. And, as […]

podcast

Critical infrastructure and geopolitical risk – Mathieu Gorge

May 25, 2022 admin

Over the last decade, we have witnessed the increasing use of cyber as a political lever and a tool of conflict, if not a weapon of war. Attacks on critical infrastructure, or the potential for […]

Man holding smartphone
podcast

Mobile security: a hidden weakness?

March 16, 2022 admin

Organisations of all sizes now depend heavily on mobile devices. And mobile security rarely makes the headlines these days. Yet the risks posed by ever more powerful devices, and networks, are all too real, and […]

podcast

How to hack a power station: critical infrastructure, and new norms for cyber

May 18, 2021 admin

Critical infrastructure is on the front line of cybersecurity. An attack on power, sanitation, healthcare, or even the banking system, could be catastrophic. But it could happen. Back in the 1990s, ethical hacker Joe Carson […]

Recent Posts

  • Beyond the Titanic: Cybersecurity in Northern Ireland
  • Cybersecurity Skills: security and open source
  • CISO Interview: Mandy Andress, Elastic
  • Insights interview: Dr Claudia Natanson, UK Cyber Security Council
  • Cybersecurity Skills: Amanda Finch, CIISec

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • May 2019

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Subscribe to Podcast

Androidby EmailRSS
  • Privacy policy
  • Cookie policy (UK)

Copyright © 2025 | MH Magazine WordPress Theme by MH Themes

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}