Remove 2009 Remove Energy and Utilities Remove Government Remove IT
article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

National Security Agency (NSA) in 2009, LookingGlass Cyber Solutions provides three threat intelligence analysis products: a threat intelligence platform ( scoutPrime ), a threat modeling tool ( scoutThreat ), and an attack surface monitoring solution ( scoutInspect ). Company Description Spun out from the U.S.

article thumbnail

Predictions 2024: It’s All About The Data

John Battelle's Searchblog

AI is driven by data, and as a society we’re not particularly good at structuring, governing, or sharing data. If I can avoid talking about the joys of the upcoming election and/or the politics of Silicon Valley billionaires, I’m optimistic I’ll return to form. Let’s get to it. The AI party takes a pause.

Marketing 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Updates on Federal Cybersecurity Legislation

Hunton Privacy

This bill would amend the Federal Power Act to grant the Federal Energy Regulatory Commission (“FERC”) authority to issue emergency orders requiring critical infrastructure facility operators to take actions necessary to protect the bulk power system. The American Clean Energy Leadership Act. The American Clean Energy Leadership Act.

article thumbnail

DB2 Dispatch from Vegas: IOD, Day One

Robert's Db2

Information management , the foundation for successful analytics, has much to do with data governance (about which I wrote in a recent article published in IBM Data Management Magazine ) and the establishment of a "single version of the truth" with regard to questions that might be answered based on the organization's data assets.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Big energy companies expect action whenever there is a move to end drilling leases for federal lands, in exchange for the tens of millions they contribute to congressional reelection campaigns. We should expect these techniques to get better and their utilization to grow, just as we’ve seen in so many other domains.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Permissioned blockchains, or private blockchains,aren’t truly decentralized because they’re organized by a governance structure and authentication process for nodes. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Types of Endpoints Matter.