About the Review


Welcome to the Critical Infrastructure Protection (CIP) Review website.

Today’s interdependent and interconnected world requires joint efforts and holistic approaches to protect critical infrastructure assets from the growing number of attacks and to address ever-evolving convergent threats to our economy, security and well-being.

Critical Infrastructure Protection Review is the go-to destination for the latest news, insights and expert knowledge, and designed to assist governments, public and private sectors in improving security and resilience of vital critical infrastructures, strengthening their preparedness to withstand and recover from the physical and cyber attacks.

With a subscriber base encompassing key decision makers and professionals from the defence, law enforcement, aerospace, transportation, energy, banking, telecommunication and other critical sectors, we aim to enhance cooperation and provide an effective information-sharing platform and engage top-security leaders through news, articles and events.

Subscribe to the CIP Review newsletter


Top News


  • Cumbria health trust hit by 147 cyber attacks in five years

    January 19, 2019

    The NHS in Cumbria has been hit by more than 150 cyber attacks in five years, the BBC can reveal. Of these, 147 were directed at University Hospitals of Morecambe Bay NHS Trust (UHMBT), which runs hospitals in Barrow, Kendal, Morecambe and Lancaster. The trust said it had spent £29,600 in 2017 dealing with the effects of ...

  • Anti-vaxxers are among the top ‘threats to global health’ in 2019, WHO declares

    January 18, 2019

    Anti-vaxxers have been named one of the top threats to global health in 2019 by the World Health Organization (WHO). The anti-vaccine movement joined air pollution and climate change, HIV, and a worldwide influenza pandemic on the list released on Monday. ‘Vaccine hesitancy’, as the WHO calls it, ‘threatens to reverse progress made in tackling vaccine-preventable diseases.’ The ...

  • South Korea’s weapon servers compromised by unknown hackers

    January 17, 2019

    South Korea’s Ministry of Defence has announced that 10 of its critical systems holding information on the military’s weapon systems had been compromised by unknown hackers. The incident occurred in October where attackers attempted to gain access to 30 of South Korea’s important systems but were only successful in 10 instances. The incident was first reported by Dong-A ...

  • FBI arrest Isil supporter who planned to attack White House with anti-tank rocket

    January 17, 2019

    An American supporter of the Islamic State has been arrested after he plotted to blow a hole in the White House with an anti-tank rocket and storm the building. Hasher Jallal Taheb, 21, from the town of Cumming, Georgia, was arrested by the FBI on Wednesday, on the eve of his planned attack. He had been watched since March, ...

  • Car bomber kills 10 in Colombia police academy attack

    January 17, 2019

    A car bomb exploded at a police academy in Colombia’s capital Bogota on Thursday, killing at least 10 people and wounding over 50 in an attack that prompted fears of a return to the country’s violent past. Authorities said the car broke through checkpoints into the grounds of the General Santander School and exploded, shattering windows ...

  • Data breaches, cyberattacks are top global risks alongside natural disasters and climate change

    January 16, 2019

    Cyberattacks and their potential to cripple critical infrastructure remain one of the biggest risks facing the world today, the World Economic Forum (WEF) has warned. Both large-scale cyberattacks and mass incidents of data theft feature in the top five most likely risks in the WEF’s Global Risks Report 2019. The WEF is an international group that aims ...

  • GE sees digital ghost deployments in 2019

    January 15, 2019

    GE said it plans to make its digital ghost technology commercial available in late 2019 and expand it into oil and gas and renewable energy industries. Launched in 2017 out of GE’s research unit, digital ghost is a security spin on digital twin technology. Where the digital twin replicates physical equipment virtually for predictive maintenance and other ...

  • 14 reported dead after Kenya hotel attack claimed by Somali Islamists

    January 15, 2019

    Gunmen blasted their way into a hotel and office complex in the Kenyan capital on Tuesday, killing at least 14 people and sending workers diving under desks from an attack claimed by Somali Islamist group al Shabaab. Eight hours after the assault began at Nairobi’s upscale 14 Riverside Drive complex, a burst of gunfire was heard in ...

  • Yes, you can remotely hack factory, building site cranes. Wait, what?

    January 15, 2019

    Did you know that the manufacturing and construction industries use radio-frequency remote controllers to operate cranes, drilling rigs, and other heavy machinery? Doesn’t matter: they’re alarmingly vulnerable to being hacked, according to Trend Micro. Available attack vectors for mischief-makers include the ability to inject commands, malicious re-pairing and even the ability to create one’s own custom ...

  • 4 dead, 44 wounded in Kabul VBIED explosion

    January 14, 2019

    At least four people lost their lives and forty four others sustained injuries in an explosion triggered by a Vehicle-borne Improvised Explosive Device (VBIED) in Kabul city earlier this evening. Officials in Kabul police commandment confirmed the casualties toll and said at least ten children were among those wounded. The Ministry of Interior spokeman Najjib Danish had ...

  • Blockchain Technology Ensures Privacy And Security Of Aircraft Data

    January 12, 2019

    The United States National Aeronautics and Space Administration (NASA) is exploring the potential of Blockchain Technology in order to ensure privacy, authentication, and security of aircraft data. An aero-computer engineer at NASA Ames Research Center Ronald Reisman published a paper which stated that an engineering prototype of the “Aviation Blockchain Infrastructure” (ABI) can be used to mitigate some security issues of the Automatic ...

  • Drone jamming system to protect European airports, public spaces

    January 11, 2019

    ‘There are some who are using them for criminal acts. For example, drones are being used to smuggle drugs, telephones or other stuff into prisons. That is a very specific use case where the pilot is deliberately breaking the rules. ‘There is another category where we categorise it as terrorism or harassment, which is what we ...

  • Poland arrests Huawei worker on allegations of spying for China

    January 11, 2019

    Poland has arrested a Chinese employee of Huawei and a Polish national involved in cyber-business on allegations of spying, Polish state media has reported, deepening the controversy over western criticism of the Chinese telecoms company. However, a spokesman for the Polish security services told Reuters the allegations related to individual actions, and were not linked directly to Huawei. US ...

  • NotPetya malware victim sues its insurance company

    January 11, 2019

    A US food distributor that was hit by the NotPetya cyber attack is taking legal action against its insurance company for refusing to pay out on a $100m claim for damages caused by the hack. Mondelez, which owns popular brands Oreo and Cadbury, was hit by NotPetya twice in 2017, suffering significant damage to its IT infrastructure including ...

  • Marines set up specialist Novichok unit in response to Salisbury attack

    January 10, 2019

    The Royal Marines have set up a unit specialising in chemical warfare skills to prepare for a repeat of the Novichok attack on Salisbury. Zulu Company from 45 Commando, based in Arbroath, Scotland, will be the first marines to respond to a chemical, biological, radiological or nuclear (CBRN) incident at home or abroad. The commandos were given the training in ...


NEWS BY SECTOR


Transportation,Energy,Oil,Natural Gas,Utilities,Power Grid,Power,Generation,Banking,Finance,Aviation,Aerospace,Defence,Petrochemical,Security,Cybersecurity,SCADA,ICS,Industrial Security,
IoT,IoBT,IoIT,IED,Explosives,HMW,CBRNe,CBRN,HazMat,Nuclear,Biological,Radiological,Outbreak,Infection,Public Health,Rail Network,Emergency Services,First Responders,Perimeter Security, Access Control,Biometric ID,Facial Recognition,APT,Cybercrime,Radiation,Business Continuity,Surveillance,GDPR,Privacy,PKI,CIP