Search - Search on Articles, Blogs & Tags

Africa 194 Asia 493 Australasia 19 Climate change 5 Coal 98 Cogeneration 1 Concentrating solar 4 Cyber security 3 Decentralised energy 2 Digitalisation 5 Distributed energy 3 Distribution 43 Electric vehicles EVs 1 Emissions 18 Equipment 2 Europe 700 Gas 126 Gas engine plant 24 Horizon 2 Hydroelectric 17 Hydropower 21 Latin America 25 Maintenance 2 Metering 1 microgrid 2 Middle East 233 North America 792 Nuclear 441 Offshore wind 36 Oil 8 Operations 2 Policy 5 Regulations 1 Renewables 622 Solar 83 Storage 15 substation 8 Tepco 2 Tidal 1 Toshiba 4 Transmission 67 US Senate Washington 2 Wind 89

Total Results : 3

Addressing four major risks to the physical data security of energy facilities

  • 2019-01-23 22:52:42.057244
  • Junior Isles

Physical data security is often overlooked within energy facilities – where the stakes could not be higher.

By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens

The energy sector and cyber security: the other capacity gap

  • 2018-10-09 15:09:57
  • Junior Isles

Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.

By Anjos Nijk, Managing Director at ENCS

 

The DDoS threat for energy and utility companies

  • 2017-11-25 20:35:31
  • Junior Isles

By Scott Taylor, VP at Corero Network Security

The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).

By Scott Taylor, VP at Corero Network Security

 

Media Partners