The US has charged four Russian government employees with cyber-attacks on the global energy sector, targeting hundreds of companies and organisations in over 100 countries.
The energy industry continues to make great strides to rapidly modernise and adopt “smarter infrastructure”. But the same considerations must also be made for upgrading security.
By Steve Green, Regional Sales Manager UK at Genetec
In the last year alone, a number of high-profile attacks have hit the utilities and energy sector. But how can companies protect themselves when attacks are becoming ever more sophisticated?
By Miles Tappin, VP of EMEA at ThreatConnect
Siemens has published a new incident response (IR) “playbook” that guides utilities on how to respond to a cyber attack.
By Rich Turner, SVP EMEA at CyberArk
The introduction of IoT sensors, smart meters, and integrated cloud services requires a proactive and up-to-date mindset when it comes to cyber security.
Physical data security is often overlooked within energy facilities – where the stakes could not be higher.
By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens
Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.
By Anjos Nijk, Managing Director at ENCS
By Scott Taylor, VP at Corero Network Security
The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).
By Scott Taylor, VP at Corero Network Security