About the Review

Welcome to the Critical Infrastructure Protection (CIP) Review website.

Today’s interdependent and interconnected world requires joint efforts and holistic approaches to protect critical infrastructure assets from the growing number of attacks and to address ever-evolving convergent threats to our economy, security and well-being.

Critical Infrastructure Protection Review – the go-to destination for the latest news, insights and expert knowledge, is designed to assist governments, and the public and private sectors to improve security and resilience of vital critical infrastructures and strengthen their preparedness to withstand and recover from the physical and cyber attacks.

With a subscriber base encompassing key decision makers and professionals from the defence, law enforcement, aerospace, transportation, energy, banking, telecommunication and other critical sectors, we aim to enhance cooperation and provide an effective information-sharing platform and engage top-security leaders through news, articles and events.

Subscribe to the magazine and newsletter

Top News

  • Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack

    February 7, 2018

    Unauthorized crytocurrency mining attacks, sometimes referred to as “cryptojacking” have found a new target – operational technology used in critical industrial infrastructure. Security firm Radiflow, discovered that cryptocurrency mining malware was found in the network of a water utility provider in Europe. The attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial ...

  • Pirates release crew of oil tanker hijacked off West Africa

    February 6, 2018

    Pirates have released 22 Indian nationals taken captive after their oil tanker was boarded off the coast of West Africa last week. The vessel, Marine Express, was carrying more than 13,000 tons of gasoline when it went missing in the Gulf of Guinea, according to a statement from the Anglo Eastern, the ship’s managing company, which ...

  • Why Every Company Should Consider Creating a “Cyber No-Fly List”

    February 6, 2018

    We’ve all heard of the No-Fly List. Managed by the FBI’s Terrorist Screening Center, the list bans people on it from boarding commercial aircraft within, into, or out of the United States. The No-Fly List is only one tactic that the U.S. uses in its fight against terrorism, but since its inception there haven’t been ...

  • How to Stop a Terrorist: Identifying Extremist Activity and Behavior

    February 5, 2018

    Today the United States is facing significant and diverse terrorism threats from overseas terrorist groups, foreign extremist infiltrators, and even radicalized domestic citizens. Many attackers have overt and observable signs of radicalization or pre-attack actions that may enable prevention if suspicious activity is reported and synthesized with other available information beforehand. What signs should intelligence and ...

  • Boards should appoint lead on data security, NHS England review suggests

    February 5, 2018

    Organisations should appoint a board lead on data security and consider suspending IT access for any executive who fails to complete annual cybersecurity training, NHS England’s chief information officer has suggested. Will Smart makes the proposals in his “lessons learned” review of the WannaCry attack, which hit 35% of NHS trusts in May last year and led some to ...

  • GCHQ unit claims it has ‘objectively’ made the UK a less desirable target to cybercrims

    February 5, 2018

    GCHQ’s National Cyber Security Centre claims that its strategy of “actively defending” the UK against high-volume commodity attacks is working. The Active Cyber Defence (ACD) programme aims to “protect the majority of people in the UK from the majority of the harm, caused by the majority of the attacks, for the majority of the time”. The ...

  • State Intelligence/Fusion Center staying ahead of next threat

    February 5, 2018

    High above the congested traffic on Kanawha Boulevard across the river from the state Capitol, Scott Pauley helps manage a team of eight intelligence analysts constantly searching for the next potential threat. Pauley is deputy director of the West Virginia Intelligence/Fusion Center located inside the old Columbia Gas Building in Charleston. The highly secure facility is a ...

  • ISNR Abu Dhabi 2018 to Examine Role of Artificial Intelligence in Homeland Security in Line with UAE Leadership’s Vision

    February 5, 2018

    Artificial intelligence to form essential component of Infosecurity Middle East, ME3S, collocated forums AI has potential to transform national security technology, says US study Reed Exhibitions, the leading global event organiser, confirmed that in line with the UAE leadership’s vision, artificial intelligence (AI) will form an important underlying component of the eighth edition of the International Exhibition ...

  • Explosive material en route to Gaza captured by Israeli border authorities

    February 4, 2018

    Israeli authorities in charge of supervising goods entering the Gaza Strip recently found material that can be used to build explosive devices hidden among medical equipment. Boxes containing material for assembling bombs were captured by Israeli authorities last week at a border crossing into Gaza. The material has been transferred to a lab for examination and ...

  • The TSA confiscated a record number of guns in passenger carry-on bags in 2017

    February 4, 2018

    ustling U.S. airports set a dubious record in 2017, intercepting nearly 4,000 firearms in passenger bags at checkpoints around the country, according to data released last week by the Transportation Security Administration. Last year, the agency — which routinely confiscates questionable items that could be used as weapons — found a record 3,957 guns tucked away in carry-ons, according ...

  • DDoS mystery: Who’s behind this massive wave of attacks targeting Dutch banks?

    February 1, 2018

    There is as yet no indication of who is behind the massive distributed denial of service (DDoS) attacks on Netherlands banks and government websites that ran from last weekend to Tuesday. Initial reports suggesting a Russian connection appear baseless. The attacks began just a couple of days after media reports stated that Dutch intelligence tipped off their ...

  • Achieving cybersecurity on the water

    February 1, 2018

    If Russia can hack its way into our elections and digital mischief makers in China can deface the White House website, what chance do vessel operators have of maintaining cybersecurity within their fleets? Once we’re networked, there probably is no such thing as absolute security, but given our dependence on digital data for everything from navigation ...