Search - Search on Articles, Blogs & Tags

Africa 197 Asia 523 Australasia 22 Climate change 5 Coal 108 Cogeneration 1 Concentrating solar 4 Cyber security 3 Decentralised energy 3 Digitalisation 6 Distributed energy 4 Distribution 47 Electric vehicles EVs 1 Emissions 19 Equipment 2 Europe 717 Gas 147 Gas engine plant 27 Horizon 2 Hydroelectric 17 Hydropower 24 Latin America 28 Maintenance 2 Metering 1 microgrid 2 Middle East 242 North America 812 Nuclear 453 Offshore wind 40 Oil 8 Operations 2 Policy 5 Regulations 1 Renewables 629 Solar 93 Storage 18 substation 8 Tepco 2 Tidal 1 Toshiba 4 Transmission 75 US Senate Washington 2 Wind 98

Total Results : 3

Addressing four major risks to the physical data security of energy facilities

  • 2019-01-23 22:52:42.057244
  • Junior Isles

Physical data security is often overlooked within energy facilities – where the stakes could not be higher.

By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens

The energy sector and cyber security: the other capacity gap

  • 2018-10-09 15:09:57
  • Junior Isles

Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.

By Anjos Nijk, Managing Director at ENCS

 

The DDoS threat for energy and utility companies

  • 2017-11-25 20:35:31
  • Junior Isles

By Scott Taylor, VP at Corero Network Security

The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).

By Scott Taylor, VP at Corero Network Security