Search - Search on Articles, Blogs & Tags

Africa 190 Asia 485 Australasia 19 Climate change 4 Coal 92 Cogeneration 1 Concentrating solar 3 Cyber security 3 Decentralised energy 1 Digitalisation 5 Distributed energy 2 Distribution 40 Electric vehicles EVs 1 Emissions 16 Equipment 2 Europe 692 Gas 116 Gas engine plant 23 Horizon 2 Hydroelectric 17 Hydropower 20 Latin America 21 Maintenance 2 Metering 1 Middle East 222 North America 782 Nuclear 437 Offshore wind 29 Oil 8 Operations 2 Policy 5 Regulations 1 Renewables 617 Solar 77 Storage 14 substation 7 Tepco 2 Toshiba 4 Transmission 59 US Senate Washington 2 Wind 83

Total Results : 3

Addressing four major risks to the physical data security of energy facilities

  • 2019-01-23 22:52:42.057244
  • Junior Isles

Physical data security is often overlooked within energy facilities – where the stakes could not be higher.

By Douglas Miorandi, Director of U.S. Federal Programs at Metrasens

The energy sector and cyber security: the other capacity gap

  • 2018-10-09 15:09:57
  • Junior Isles

Here is a statement that I’m sure most of our industry leaders would agree with: Society needs energy, and demand will only grow. We need more power and to be smarter about how we use it to maintain security of supply. Now replace the word ‘power’ with ‘cyber security resource’. Would as many people agree? They should.

By Anjos Nijk, Managing Director at ENCS

 

The DDoS threat for energy and utility companies

  • 2017-11-25 20:35:31
  • Junior Isles

By Scott Taylor, VP at Corero Network Security

The Internet of Things represents a new reality for the energy sector, improving how we manage our power distribution and consumption, and enabling a more flexible and efficient energy grid. This has introduced a range of benefits, including a greater flexibility to accommodate new energy sources, better management of assets as well as greater reliability of services. But as operating systems have become increasingly connected to the Internet, it has also increased the potential for damaging cyber attacks such as Distributed Denial of Service (DDoS).

By Scott Taylor, VP at Corero Network Security