Search - Search on Articles, Blogs & Tags

Africa 195 Asia 508 Australasia 20 Climate change 5 Coal 103 Cogeneration 1 Concentrating solar 4 Cyber security 3 Decentralised energy 2 Digitalisation 6 Distributed energy 4 Distribution 43 Electric vehicles EVs 1 Emissions 19 Equipment 2 Europe 708 Gas 135 Gas engine plant 26 Horizon 2 Hydroelectric 17 Hydropower 24 Latin America 26 Maintenance 2 Metering 1 microgrid 2 Middle East 237 North America 807 Nuclear 448 Offshore wind 38 Oil 8 Operations 2 Policy 5 Regulations 1 Renewables 624 Solar 89 Storage 16 substation 8 Tepco 2 Tidal 1 Toshiba 4 Transmission 73 US Senate Washington 2 Wind 94

Total Results : 3

Addressing four major risks to the physical data security of energy facilities

  • 2019-01-23 22:52:42.057244
  • Junior Isles

Physical data security is often overlooked within energy facilities – where the stakes could not be higher.

By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens

The energy sector and cyber security: the other capacity gap

  • 2018-10-09 15:09:57
  • Junior Isles

Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.

By Anjos Nijk, Managing Director at ENCS

 

The DDoS threat for energy and utility companies

  • 2017-11-25 20:35:31
  • Junior Isles

By Scott Taylor, VP at Corero Network Security

The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).

By Scott Taylor, VP at Corero Network Security