article thumbnail

Securing the electricity network: Understanding the unique ICS environment of a utility

CGI

Securing the electricity network: Understanding the unique ICS environment of a utility. In December 2015, 230,000 Ukrainian residents experienced a power outage of up to six hours after 60 substations went offline due to a malware attack. harini.kottees…. Thu, 06/22/2017 - 04:31. More points to secure. Increasing avenues of risk.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

This guidance utilizes principles that can be adopted by a variety of institutions, not just Federal agencies. NARA’s policies are social media include: NARA Bulletin 2015-02: Guidance on managing electronic messages. Best Practices for Social Media White Paper. NARA Bulletin 2014-02: Guidance on managing social media records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital sobriety

Everteam

What we can say for sure is that manufacturing user equipment is the most expensive, from both an energy and an environmental viewpoint. ” If calculating the carbon footprint and GHG emissions seems difficult, what about the energy cost? Apart from renewable energies, it is the energy with the best carbon footprint.

article thumbnail

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

Security Affairs

This is a virtual act of Treason by a once great paper so desperate for a story, any story, even if bad for our Country… — Donald J. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Trump (@realDonaldTrump) June 16, 2019. … ALSO, NOT TRUE! ” concludes the NYT.