ICS-CERT report finds more than 600 IT security weaknesses in US critical infrastructure

Dan Worth
clock • 4 min read

Water, energy and gas supply all vulnerable, warns ICS-CERT

The trend for connecting critical infrastructure to the internet has led to more than 600 IT security weaknesses being found in industrial control systems (ICS) in critical infrastructure in the US...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Spring Statement 2024: What does it mean for tech?

Government

£800m to boost public sector productivity, and AI everywhere

clock 06 March 2024 • 7 min read
NAO chief urges reforms for £20 billion public sector savings

Government

Important to take 'calculated risks' and avoid 'IT mega projects'

clock 17 January 2024 • 3 min read
IT Essentials: Public pitfalls

Public Sector

The private sector could shine this year, but there's a warning note

clock 15 January 2024 • 3 min read

More on Security

Vanta: Cybersecurity spend should be 30% of the IT budget

Vanta: Cybersecurity spend should be 30% of the IT budget

Currently it's 9% in the UK

clock 03 May 2024 • 4 min read
Security Excellence Awards – winners revealed!

Security Excellence Awards – winners revealed!

The technologies, projects, partners and people leading the way in cybersecurity

clock 03 May 2024 • 2 min read
Next's CISO: Learn from attackers to boost cyber defences

Next's CISO: Learn from attackers to boost cyber defences

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

Tom Allen
clock 02 May 2024 • 4 min read