logo
#

Latest news with #ColonialPipeline

Brookfield Infrastructure Partners LP (BIP) Q2 2025 Earnings Call Highlights: Record Capital ...
Brookfield Infrastructure Partners LP (BIP) Q2 2025 Earnings Call Highlights: Record Capital ...

Yahoo

time01-08-2025

  • Business
  • Yahoo

Brookfield Infrastructure Partners LP (BIP) Q2 2025 Earnings Call Highlights: Record Capital ...

Funds from Operations (FFO): $638 million or $0.81 per unit, up 5% year-over-year; 9% increase excluding foreign exchange effects. Utilities Segment FFO: $187 million, slightly ahead of the prior year. Transport Segment FFO: $304 million, slightly ahead of the prior year after adjustments. Midstream Segment FFO: $157 million, a 10% increase over the previous year. Data Segment FFO: $113 million, a 45% increase compared to the prior year. Capital Recycling Proceeds: $2.4 billion secured to date in 2025. Australian Export Terminal Sale: $280 million in proceeds, 22% cumulative return, 4 times capital multiple. European Data Center Platform Sale: $200 million in proceeds, finalizing a 90% sell-down. Global Intermodal Logistics Operations Sale: $115 million in proceeds, two-thirds of the portfolio sold. UK Port Operation Sale: $385 million in proceeds, 19% IRR, 7.5 times capital multiple. New Investments: $1.3 billion capital deployment in data, transport, and midstream segments. Hotwire Acquisition: Up to $500 million equity purchase cost, closing expected late Q3 2025. Railcar Leasing Platform Acquisition: $300 million equity contribution, closing anticipated Q1 2026. Colonial Pipeline Acquisition: $9 billion acquisition, $500 million equity consideration, closing today. Warning! GuruFocus has detected 10 Warning Signs with BIP. Release Date: July 31, 2025 For the complete transcript of the earnings call, please refer to the full earnings call transcript. Positive Points Brookfield Infrastructure Partners LP (NYSE:BIP) reported a 5% increase in funds from operations (FFO) to $638 million, or $0.81 per unit, compared to the previous year. The company's data segment saw a significant 45% increase in FFO, driven by acquisitions and new capacity commissioning. BIP successfully executed its capital recycling strategy, securing $2.4 billion in sale proceeds, setting an annual record. The Canadian midstream segment experienced a 10% increase in FFO, supported by strong organic growth and higher customer activity. BIP made significant new investments, including a $9 billion acquisition of Colonial, the largest refined products pipeline system in the U.S., expected to yield a mid-teen cash return. Negative Points The sale of the Mexican regulated natural gas transmission business partially offset the strong performance in the utilities segment. Foreign exchange effects negatively impacted the overall FFO growth, which would have been 9% without these effects. The transport segment's FFO was only slightly ahead of the prior year after adjustments for capital recycling and foreign exchange. There is uncertainty in the regulatory approval process for the NS and UP merger, which could impact BIP's rail operations. The liquidity position, while strong, does not account for the $1.3 billion in new investments, potentially affecting future flexibility. Q & A Highlights Q: What has prompted the acceleration in deal velocity for Brookfield Infrastructure Partners (NYSE:BIP) in 2025 compared to 2024? A: Sam Pollock, Chief Executive Officer, explained that while operating conditions have remained consistent, there was a lull in transaction activity last year. The current acceleration is likely due to investors returning to the market, driven by strong capital markets and significant dry powder. BIP is optimistic about the current market, particularly with the impact of AI infrastructure on their businesses. Q: Are there opportunities to monetize partial stakes in Canadian midstream businesses, given the attractive backdrop? A: Sam Pollock, CEO, indicated that while there are always opportunities to sell down stakes, the focus is primarily on organic growth opportunities. However, bringing in partners to fund growth is a possibility, and there is significant interest in the Canadian midstream sector from both retail and institutional investors. Q: What protections does Brookfield have in place for the Intel JV, and when is it expected to start generating returns? A: Sam Pollock, CEO, stated that the arrangement with Intel is largely financial and contractual, with no commercial risk on capital cost overruns or product commercialization. Contributions from this investment are expected as early as the end of next year or early 2027. Q: How might the potential east-west mergers of Class 1 railroads impact Genesee & Wyoming? A: David Joynt, Managing Partner, noted that while the merger is subject to regulatory review, Genesee & Wyoming operates as a neutral party in the rail network, providing first-mile and last-mile access. They are in a unique position to maintain a competitive market and will engage with merger parties and regulators. Q: Why is the US considered one of the most attractive investment geographies for BIP currently? A: Sam Pollock, CEO, explained that the US is attractive due to the AI infrastructure boom, which drives opportunities in power, transmission, and midstream investments. While other countries are also investing in AI, the US currently leads in deployment, creating significant opportunities for BIP. For the complete transcript of the earnings call, please refer to the full earnings call transcript. This article first appeared on GuruFocus. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

Yahoo

time19-07-2025

  • Yahoo

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry's growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking go mainstream. Pop culture has embraced hackers with hit TV shows like Mr. Robot, and movies like Leave The World Behind. But perhaps the most prolific medium for cybersecurity stories — both fiction and based on reality — are books. We have curated our own list of best cybersecurity books, based on the books we have read ourselves, and those that the community suggested on Mastodon and Bluesky. This list of books (in no particular order) will be periodically updated. , Kim Zetter The cyberattack coordinated by Israeli and U.S. government hackers known as Stuxnet, which damaged the centrifuges at the Iranian nuclear facility in Natanz, is almost certainly the most well-known hack in history. Because of its impact, its sophistication, and its sheer boldness, the attack captured the imagination not only of the cybersecurity community, but the larger public as well. Veteran journalist Kim Zetter tells the story of Stuxnet by treating the malware like a character to be profiled. To achieve that, Zetter interviews virtually all the main investigators who found the malicious code, analyzed how it worked, and figured out what it did. It's a must read for anyone who works in the cyber field, but it also serves as a great introduction to the world of cybersecurity and cyberespionage for regular folks. , Joseph Cox There haven't been any sting operations more daring and expansive than the FBI's Operation Trojan Shield, in which the feds ran a startup called Anom that sold encrypted phones to some of the worst criminals in the world, from high-profile drug smugglers to elusive mobsters. Those criminals thought they were using communication devices specifically designed to avoid surveillance. In reality, all their supposedly secure messages, pictures, and audio notes were being funneled to the FBI and its international law enforcement partners. 404 Media journalist Joseph Cox masterfully tells the story of Anom, with interviews with the sting operation's masterminds in the FBI, the developers and workers who ran the startup, and the criminals using the devices. , Cliff Stoll In 1986, astronomer Cliff Stoll was tasked with figuring out a discrepancy of $0.75 in his lab's computer network usage. At this point, the internet was mostly a network for government and academic institutions, and these organizations paid depending on how much time online they spent. Over the next year, Stoll meticulously pulled the threads of what seemed like a minor incident and ended up discovering one of the first-ever recorded cases of government cyberespionage, in this case carried out by Russia's KGB. Stoll not only solved the mystery, but he also chronicled it and turned it into a gripping spy thriller. It's hard to understate how important this book was. When it came out in 1989, hackers were barely a blip in the public's imagination. The Cuckoo's Egg showed young cybersecurity enthusiasts how to investigate a cyber incident, and it showed the wider public that stories about computer spies could be as exciting as those of real-life James Bond-like figures. , Kashmir Hill Face recognition has quickly gone from a technology that seemed all-powerful in movies and TV shows — but was actually janky and imprecise in real-life — to an important and relatively accurate tool for law enforcement in its daily operations. Longtime tech reporter Kashmir Hill tells the history of the technology through the rise of one of the controversial startups that made it mainstream: Clearview AI. Unlike other books that profile a startup, at least one of Clearview AI's founders partially engaged with Hill in an attempt to tell his own side of the story, but the journalist did a lot of work to fact-check — and in some cases debunk — some of what she heard from her company sources. Hill is the best positioned writer to tell the story of Clearview AI after first revealing its existence in 2020, which gives the book an engaging first-person narrative in some sections. , Joseph Menn Investigative cyber reporter Joseph Menn tells the incredible true back story of the influential Cult of the Dead Cow, one of the oldest hacking supergroups from the '80s and '90s, and how they helped to transform the early internet into what it has become today. The group's members include mainstream names, from tech CEOs and activists, some of whom went on to advise presidents and testify to lawmakers, to the security heroes who helped to secure much of the world's modern technologies and communications. Menn's book celebrates both what the hackers achieved, built, and broke along the way in the name of bettering cybersecurity, freedom of speech and expression, and privacy rights, and codifies the history of the early internet hacking scene as told by some of the very people who lived it. , Emily Crose 'Hack to the Future' is an essential read for anyone who wants to understand the incredible and rich history of the hacking world and its many cultures. The book's author, Emily Crose, a hacker and security researcher by trade, covers some of the earliest hacks that were rooted in mischief, through to the modern day, with no detail spared on the decades in between. This book is deeply researched, well represented, and both part-history and part-celebration of the hacker community that morphed from the curious-minded misfits whistling into a telephone to score free long-distance calls, to becoming a powerful community wielding geopolitical power and featured prominently in mainstream culture. , Andy Greenberg The concept of cryptocurrency was born in 2008 a white paper published by a mysterious (and still unknown) figure called Satoshi Nakamoto. That laid the foundation for Bitcoin, and now, almost 20 years later, crypto has become its own industry and embedded itself in the global financial system. Crypto is also very popular among hackers, from low-level scammers, to sophisticated North Korean government spies and thieves. In this book, Wired's Andy Greenberg details a series of high-profile investigations that relied on following the digital money through the blockchain. Featuring interview with the investigators who worked on these cases, Greenberg tells the behind the scenes of the takedown of the pioneering dark web marketplace Silk Road, as well as the operations against dark web hacking marketplaces (Alpha Bay), and the 'world's largest' child sexual abuse website called 'Welcome to Video.' , Barton Gellman Over a decade ago, former NSA contractor Edward Snowden blew wide open the vast scale of the U.S. government's global surveillance operations by leaking thousands of top secret files to a handful of journalists. One of those journalists was Barton Gellman, a then-Washington Post reporter who later chronicled in his book Dark Mirror the inside story of Snowden's initial outreach and the process of verifying and reporting the cache of classified government files provided by the whistleblower. From secretly tapping the private fiber optic cables connecting the datacenters of some of the world's biggest companies, to the covert snooping on lawmakers and world leaders, the files detailed how the National Security Agency and its global allies were capable of spying on almost anyone in the world. Dark Mirror isn't just a look back at a time in history, but a first-person account of how Gellman investigated, reported, and broke new ground on some of the most influential and important journalism of the 21st century, and should be required reading for all cyber journalists. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

TechCrunch

time19-07-2025

  • TechCrunch

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry's growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking go mainstream. Pop culture has embraced hackers with hit TV shows like Mr. Robot, and movies like Leave The World Behind. But perhaps the most prolific medium for cybersecurity stories — both fiction and based on reality — are books. We have curated our own list of best cybersecurity books, based on the books we have read ourselves, and those that the community suggested on Mastodon and Bluesky. This list of books (in no particular order) will be periodically updated. Countdown to Zero Day, Kim Zetter The cyberattack coordinated by Israeli and U.S. government hackers known as Stuxnet, which damaged the centrifuges at the Iranian nuclear facility in Natanz, is almost certainly the most well-known hack in history. Because of its impact, its sophistication, and its sheer boldness, the attack captured the imagination not only of the cybersecurity community, but the larger public as well. Veteran journalist Kim Zetter tells the story of Stuxnet by treating the malware like a character to be profiled. To achieve that, Zetter interviews virtually all the main investigators who found the malicious code, analyzed how it worked, and figured out what it did. It's a must read for anyone who works in the cyber field, but it also serves as a great introduction to the world of cybersecurity and cyberespionage for regular folks. Dark Wire, Joseph Cox There haven't been any sting operations more daring and expansive than the FBI's Operation Trojan Shield, in which the feds ran a startup called Anom that sold encrypted phones to some of the worst criminals in the world, from high-profile drug smugglers to elusive mobsters. Those criminals thought they were using communication devices specifically designed to avoid surveillance. In reality, all their supposedly secure messages, pictures, and audio notes were being funneled to the FBI and its international law enforcement partners. 404 Media journalist Joseph Cox masterfully tells the story of Anom, with interviews with the sting operation's masterminds in the FBI, the developers and workers who ran the startup, and the criminals using the devices. The Cuckoo's Egg, Cliff Stoll In 1986, astronomer Cliff Stoll was tasked with figuring out a discrepancy of $0.75 in his lab's computer network usage. At this point, the internet was mostly a network for government and academic institutions, and these organizations paid depending on how much time online they spent. Over the next year, Stoll meticulously pulled the threads of what seemed like a minor incident and ended up discovering one of the first-ever recorded cases of government cyberespionage, in this case carried out by Russia's KGB. Stoll not only solved the mystery, but he also chronicled it and turned it into a gripping spy thriller. It's hard to understate how important this book was. When it came out in 1989, hackers were barely a blip in the public's imagination. The Cuckoo's Egg showed young cybersecurity enthusiasts how to investigate a cyber incident, and it showed the wider public that stories about computer spies could be as exciting as those of real-life James Bond-like figures. Your Face Belongs to Us, Kashmir Hill Face recognition has quickly gone from a technology that seemed all-powerful in movies and TV shows — but was actually janky and imprecise in real-life — to an important and relatively accurate tool for law enforcement in its daily operations. Longtime tech reporter Kashmir Hill tells the history of the technology through the rise of one of the controversial startups that made it mainstream: Clearview AI. Unlike other books that profile a startup, at least one of Clearview AI's founders partially engaged with Hill in an attempt to tell his own side of the story, but the journalist did a lot of work to fact-check — and in some cases debunk — some of what she heard from her company sources. Hill is the best positioned writer to tell the story of Clearview AI after first revealing its existence in 2020, which gives the book an engaging first-person narrative in some sections. Cult of the Dead Cow, Joseph Menn Investigative cyber reporter Joseph Menn tells the incredible true back story of the influential Cult of the Dead Cow, one of the oldest hacking supergroups from the '80s and '90s, and how they helped to transform the early internet into what it has become today. The group's members include mainstream names, from tech CEOs and activists, some of whom went on to advise presidents and testify to lawmakers, to the security heroes who helped to secure much of the world's modern technologies and communications. Menn's book celebrates both what the hackers achieved, built, and broke along the way in the name of bettering cybersecurity, freedom of speech and expression, and privacy rights, and codifies the history of the early internet hacking scene as told by some of the very people who lived it. Hack to the Future, Emily Crose 'Hack to the Future' is an essential read for anyone who wants to understand the incredible and rich history of the hacking world and its many cultures. The book's author, Emily Crose, a hacker and security researcher by trade, covers some of the earliest hacks that were rooted in mischief, through to the modern day, with no detail spared on the decades in between. This book is deeply researched, well represented, and both part-history and part-celebration of the hacker community that morphed from the curious-minded misfits whistling into a telephone to score free long-distance calls, to becoming a powerful community wielding geopolitical power and featured prominently in mainstream culture. Tracers in the Dark, Andy Greenberg The concept of cryptocurrency was born in 2008 a white paper published by a mysterious (and still unknown) figure called Satoshi Nakamoto. That laid the foundation for Bitcoin, and now, almost 20 years later, crypto has become its own industry and embedded itself in the global financial system. Crypto is also very popular among hackers, from low-level scammers, to sophisticated North Korean government spies and thieves. In this book, Wired's Andy Greenberg details a series of high-profile investigations that relied on following the digital money through the blockchain. Featuring interview with the investigators who worked on these cases, Greenberg tells the behind the scenes of the takedown of the pioneering dark web marketplace Silk Road, as well as the operations against dark web hacking marketplaces (Alpha Bay), and the 'world's largest' child sexual abuse website called 'Welcome to Video.' Dark Mirror, Barton Gellman Over a decade ago, former NSA contractor Edward Snowden blew wide open the vast scale of the U.S. government's global surveillance operations by leaking thousands of top secret files to a handful of journalists. One of those journalists was Barton Gellman, a then-Washington Post reporter who later chronicled in his book Dark Mirror the inside story of Snowden's initial outreach and the process of verifying and reporting the cache of classified government files provided by the whistleblower. From secretly tapping the private fiber optic cables connecting the datacenters of some of the world's biggest companies, to the covert snooping on lawmakers and world leaders, the files detailed how the National Security Agency and its global allies were capable of spying on almost anyone in the world. Dark Mirror isn't just a look back at a time in history, but a first-person account of how Gellman investigated, reported, and broke new ground on some of the most influential and important journalism of the 21st century, and should be required reading for all cyber journalists.

East Coast Gasoline Stockpiles Swell as Key Pipeline Adds Volume
East Coast Gasoline Stockpiles Swell as Key Pipeline Adds Volume

Bloomberg

time07-07-2025

  • Business
  • Bloomberg

East Coast Gasoline Stockpiles Swell as Key Pipeline Adds Volume

The operator of the largest US fuel pipeline system has raised shipments on a key gasoline line, increasing supplies for East Coast drivers in the peak summer travel season. Colonial Pipeline Co.'s Line 1, which primarily transports gasoline, boosted capacity 5% to 7% above typical summer volumes, according to a notice to shippers seen by Bloomberg. Colonial expects the increase to last through the shipping cycle that starts in late August. The company confirmed the notice.

How vulnerable is critical infrastructure to cyberattack in the US?
How vulnerable is critical infrastructure to cyberattack in the US?

The Verge

time27-06-2025

  • The Verge

How vulnerable is critical infrastructure to cyberattack in the US?

Our water, health, and energy systems are increasingly vulnerable to cyberattack. Now, when tensions escalate — like when the US bombed nuclear facilities in Iran this month — the safety of these systems becomes of paramount concern. If conflict erupts, we can expect it to be a 'hybrid' battle, Joshua Corman, executive in residence for public safety & resilience at the Institute for Security and Technology (IST), tells The Verge. 'With great connectivity comes great responsibility.' Battlefields now extend into the digital world, which in turn makes critical infrastructure in the real world a target. I first reached out to IST for their expertise on this issue back in 2021, when a ransomware attack forced the Colonial Pipeline — a major artery transporting nearly half of the east coast's fuel supply — offline for nearly a week. Since then, The Verge has also covered an uptick in cyberattacks against community water systems in the US, and America's attempts to thwart assaults supported by other governments. It's not time to panic, Corman reassures me. But it is important to reevaluate how we safeguard hospitals, water supplies, and other lifelines from cyberattack. There happen to be analog solutions that rely more on physical engineering than putting up cyber firewalls. This interview has been edited for length and clarity. As someone who works on cybersecurity for water and wastewater, healthcare, food supply chains, and power systems — what keeps you up at night? Oh, boy. When you look across what we designate as lifeline critical functions, the basic human needs — water, shelter, safety — those are among some of our most exposed and underprepared. With great connectivity comes great responsibility. And while we're struggling to protect credit card cards or websites or data, we continue to add software and connectivity to lifeline infrastructure like water and power and hospitals. We were always prey. We were just kind of surviving at the appetite of our predators, and they're getting more aggressive. How vulnerable are these systems in the US? You might have seen the uptick in ransomware starting in 2016. Hospitals very quickly became the number one preferred target of ransomware because they're what I call 'target rich, but cyber poor.' The unavailability of their service is pretty dire, so the unavailability can be monetized very easily. You have this kind of asymmetry and unmitigated feeding-frenzy, where it's attractive and easy to attack these lifeline functions. But it's incredibly difficult to get staff, resources, training, budget, to defend these lifeline functions. If you're a small, rural water facility, you don't have any cybersecurity budget. We often usher platitudes of 'just do best practices, just do the NIST framework.' But they can't even stop using end of life, unsupported technology with hard-coded passwords. 'You have this kind of asymmetry and unmitigated feeding-frenzy' It's about 85 percent of the owners and operators of these lifeline critical infrastructure entities that are target rich and cyber poor. Take water systems, for example. Volt Typhoon has been found successfully compromising US water facilities and other lifeline service functions, and it's sitting there in wait, prepositioning. [Editor's note: Volt Typhoon is a People's Republic of China state-sponsored cyber group] China specifically has intentions toward Taiwan as early as 2027. They basically would like the US to stay out of their intentions toward Taiwan. And if we don't, they're willing to disrupt and destroy parts of these very exposed, very prone facilities. The overwhelming majority don't have a single cybersecurity person, haven't heard of Volt Typhoon, let alone know if and how they should defend themselves. Nor do they have the budget to do so. Turning to recent news and the escalation with Iran, is there anything that is more vulnerable at this moment? Are there any unique risks that Iran poses to the US? Whether it's Russia or Iran or China, all of them have shown they are willing and able to reach out to water facilities, power grids, hospitals, etc. I am most concerned about water. No water means no hospital in about four hours. Any loss of pressure to the hospital's pressure zone means no fire suppression, no surgical scrubbing, no sanitation, no hydration. What we have is increasing exposure that we volunteered into with smart, connected infrastructure. We want the benefit, but we haven't paid the price tag yet. And that was okay when this was mostly criminal activity. But now that these points of access can be used in weapons of war, you could see pretty severe disruption in civilian infrastructure. Now, just because you can hit it doesn't mean you will hit it, right? I'm not encouraging panic at the moment over Iran. I think they're quite busy, and if they're going to use those cyber capabilities, it's a safer assumption they would first use them on Israel. Different predators have different appetites, and prey, and motives. Sometimes it's called access brokering, where they're looking for a compromise and they lay in wait for years. Like in critical infrastructure, people don't upgrade their equipment, they use very old things. If you believe that you'll have that access for a long time, you can sit on it and wait patiently until the time and the place of your choosing. Think of this a little bit like Star Wars. The thermal exhaust port on the Death Star is the weak part. If you hit it, you do a lot of damage. We have a lot of thermal exhaust ports all over water and healthcare specifically. What needs to be done now to mitigate these vulnerabilities? We're encouraging something called cyber-informed engineering. What we've found is if a water facility is compromised, abrupt changes in water pressure can lead to a very forceful and damaging surge of water pressure that could burst pipes. If you were to burst the water main for a hospital, there would be no water pressure to the hospital. So if you wanted to say, 'let's make sure the Chinese military can't compromise the water facility,' you'd have to do quite a bit of cybersecurity or disconnect it. What we're encouraging instead, is something much more familiar, practical. Just like in your house, you have a circuit breaker, so if there's too much voltage you flip a switch instead of burning the house down. We have the equivalent of circuit breakers for water, which are maybe $2,000, maybe under $10,000. They can detect a surge in pressure and shut off the pumps to prevent physical damage. We're looking for analog, physical engineering mitigation. 'Think of this a little bit like Star Wars.' If you want to reduce the likelihood of compromise, you add cybersecurity. But if you want to reduce the consequences of compromise, you add engineering. If the worst consequences would be a physically damaging attack, we want to take practical steps that are affordable and familiar. Water plants don't know cyber, but they do know engineering. And if we can meet them on their turf and help explain to them the consequences and then co-create affordable, realistic, temporary mitigations, we can survive long enough to invest properly in cybersecurity later. Federal agencies under the Trump administration have faced budget and staffing cuts, does that lead to greater vulnerabilities as well? How does that affect the security of our critical infrastructure? Independent of people's individual politics, there was an executive order from the White House in March that shifts more of the balance of power and responsibility to states to protect themselves, for cybersecurity resilience. And it's very unfortunate timing given the context we're in and that it would take time to do this safely and effectively. I think, without malice, there has been a confluence of other contributing factors making the situation worse. Some of the budget cuts in CISA, which is the national coordinator across these sectors, is not great. The Multi-State Information Sharing and Analysis Center is a key resource for helping the states serve themselves, and that too lost its funding. And as of yet, the Senate has not confirmed a CISA director. We should be increasing our public private partnerships, our federal and state level partnerships and there seems to be bipartisan agreement on that. And yet, across the board, the EPA, Health and Human Services, Department of Energy and CISA have suffered significant reduction in budget and staff and leadership. There's still time to correct that, but we are burning daylight on what I see as a very small amount of time to form the plan, to communicate the plan, and execute the plan. Whether we want this or not, more responsibility for cyber resilience and defense and critical functions is falling to the states, to the counties, to the towns, to individuals. Now is the time to get educated and there is a constellation of nonprofit and civil society efforts — one of them is the good work we're doing with this but we also participate in a larger group called Cyber Civil Defense. And we recently launched a group called the Cyber Resilience Corps, which is a platform for anyone who wants to volunteer to help with cybersecurity for small, medium, rural, or lifeline services. It's also a place for people to find and request these volunteers. We're trying to reduce the friction of asking for help and finding help. I think this is one of those moments in history where we want and need more from governments, but cavalry isn't coming. It's going to fall to us.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store