Search - Search on Articles, Blogs & Tags

Africa 182 Asia 474 Australasia 18 Climate change 4 Coal 84 Cogeneration 1 Concentrating solar 2 Cyber security 3 Decentralised energy 1 Digitalisation 4 Distributed energy 1 Distribution 37 Electric vehicles EVs 1 Emissions 16 Equipment 2 Europe 683 Gas 104 Gas engine plant 23 Horizon 2 Hydroelectric 15 Hydropower 17 Latin America 18 Maintenance 2 Metering 1 Middle East 212 North America 779 Nuclear 433 Offshore wind 29 Oil 6 Operations 2 Policy 5 Regulations 1 Renewables 615 Solar 69 Storage 13 substation 7 Tepco 2 Toshiba 4 Transmission 58 US Senate Washington 2 Wind 79

Total Results : 3

Addressing four major risks to the physical data security of energy facilities

  • 2019-01-23 22:52:42.057244
  • Junior Isles

Physical data security is often overlooked within energy facilities – where the stakes could not be higher.

By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens

The energy sector and cyber security: the other capacity gap

  • 2018-10-09 15:09:57
  • Junior Isles

Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.

By Anjos Nijk, Managing Director at ENCS

 

The DDoS threat for energy and utility companies

  • 2017-11-25 20:35:31
  • Junior Isles

By Scott Taylor, VP at Corero Network Security

The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).

By Scott Taylor, VP at Corero Network Security