About the Review

Welcome to the Critical Infrastructure Protection (CIP) Review website.

Today’s interdependent and interconnected world requires joint efforts and holistic approaches to protect critical infrastructure assets from the growing number of attacks and to address ever-evolving convergent threats to our economy, security and well-being.

Critical Infrastructure Protection Review is the go-to destination for the latest news, insights and expert knowledge, and designed to assist governments, public and private sectors in improving security and resilience of vital critical infrastructures, strengthening their preparedness to withstand and recover from the physical and cyber attacks.

With a subscriber base encompassing key decision makers and professionals from the defence, law enforcement, aerospace, transportation, energy, banking, telecommunication and other critical sectors, we aim to enhance cooperation and provide an effective information-sharing platform and engage top-security leaders through news, articles and events.

Subscribe to the magazine and newsletter

Top News

  • Driverless cars to be rolled out on UK roads by end of 2019, government announces

    February 7, 2019

    ‘Key priority must be ensuring cyber security defences are deployed so this fantastic, ground-breaking technology does not fall victim to hackers,’ one cyber security expert warns Self-driving cars without a human supervisor will be tested on public roads in the UK by the end of the year, under government plans. Fully driverless trials have previously only taken place on ...

  • Flaw in Multiple Airline Systems Exposes Passenger Data

    February 7, 2019

    Researchers have discovered that multiple airline e-ticketing systems do not encrypt check-in links. The security faux pas could allow bad actors on the same network as the victim to view – and in some cases even change – their flight booking details or boarding passes. Security researchers at Wandera said that eight airlines have been sending ...

  • Councils cannot afford regional security upgrades, say experts

    February 7, 2019

    Aviation security experts say regional airports are vulnerable to crime, but local councils do not have the money to make them safer and promised counter-terrorism funding is yet to be released. The Federal Government announced in last year’s budget that $50.1 million over four years would be made available to upgrade screening equipment at regional airports. The bulk ...

  • A record 4,239 guns were seized at U.S. airports last year

    February 7, 2019

    A record number of firearms were discovered at U.S. airport checkpoints last year, with more than 4,200 guns found at 249 airports nationwide, according to new government data. More than 86 percent of the guns found were loaded, according to the Transport Security Administration (TSA). The airports that saw the most firearms discovered sit along the Sun Belt, ...

  • Your New Car Is A Hacker Magnet – Automotive Industry Disconnect To Blame

    February 6, 2019

    The car that you drive today is a far cry from those of just a decade ago and in many ways is now an internet-connected computer on wheels. This push towards connectivity and smart-motoring has seen the automotive manufacturing industry shift towards becoming as much about software as they are transportation. And that means it ...

  • Cyber exercise shows need for closer federal-state coordination

    February 6, 2019

    An attack by bad guys online and on the ground on a big city’s critical infrastructure can straddle jurisdictional lines between local and federal authorities, making coordination among those groups critical but tricky, according to participants in a recent resilience exercise. “We’re outgunned when it comes to nation-state cyberattacks” that could target cyber and physical targets ...

  • South African Power Firm Eskom Fails To Secure Customer Data

    February 6, 2019

    A security researcher resorted to a public tweet about a serious data breach involving customer data, after a South African electricity provider ignored all other pleas to resolve the leak. Security researcher Devin Stokes issued the public tweet to Eskom, which is South Africa’s state-owned electricity company. The fact that Eskom, which supplies 95 percent of the electricity ...

  • Burkina Faso and DC National Guard sign counter-terror partnership

    February 5, 2019

    The District of Columbia National Guard and Armed Forces of Burkina Faso concluded a formal partnership to develop the African nation’s counter-terrorism and peacekeeping capacities as part of the U.S. National Guard Bureau’s State Partnership program. Burkina Faso is the 76th country to join the program, which will focus on building its security force capabilities, the ...

  • A Game of Drones in Venezuela and Yemen

    February 4, 2019

    Commercial drones are increasingly being employed as a tool of political violence – will they be the new guerilla weapon of choice? What do the chaos in Venezuela and the breakdown of the ceasefire in Yemen have in common? Both crises witnessed the use of low-tech unmanned aerial vehicles (UAVs), otherwise referred to as “hobby drones” ...

  • DOE, FERC Announce Technical Conference on Energy Infrastructure Security Practices

    February 4, 2019

    The U.S. Department of Energy (DOE) and the Federal Energy Regulatory Commission (FERC) announced today they will co-host a technical conference on Security Investments for Energy Infrastructure to discuss security practices to protect energy infrastructure. The technical conference will take place at 10 AM on Thursday, March 28, 2019, in the Commission Meeting Room at FERC ...

  • Honeywell Introduces First Industrial Cybersecurity Solution To Guard Against Malicious Usb Device Attacks

    February 4, 2019

    Honeywell today announced the latest release of Secure Media Exchange (SMX), a cybersecurity solution to protect industrial operators against new and emerging Universal Serial Bus (USB) threats. SMX now includes patent pending capabilities to protect against a broad range of malicious USB device attacks, which disrupt operations through misuse of legitimate USB functions or unauthorized device actions. These ...

  • 3 Cross-Industry Applications of IIoT

    February 4, 2019

    Talk about the Industrial Internet of Things (IIoT)—and its ability to bring unparalleled efficiencies to all industries—is intensifying. But what exactly does it look like in practice? As a starting point, we can look to the local government, utilities and waste sectors for lessons on how they’ve gained visibility and improved services using IIoT technologies. Before ...



Transportation,Energy,Oil,Natural Gas,Utilities,Power Grid,Power,Generation,Banking,Finance,Aviation,Aerospace,Defence,Petrochemical,Security,Cybersecurity,SCADA,ICS,Industrial Security,
IoT,IoBT,IoIT,IED,Explosives,HMW,CBRNe,CBRN,HazMat,Nuclear,Biological,Radiological,Outbreak,Infection,Public Health,Rail Network,Emergency Services,First Responders,Perimeter Security, Access Control,Biometric ID,Facial Recognition,APT,Cybercrime,Radiation,Business Continuity,Surveillance,GDPR,Privacy,PKI,CIP