Remove 2020 Remove Blog Remove Energy and Utilities Remove Government
article thumbnail

Strategize your next move to become a utilities leader, delivering value at scale and pace

CGI

Strategize your next move to become a utilities leader, delivering value at scale and pace. Mon, 02/03/2020 - 01:59. Additionally, utilities leaders say their IT investments have increased, and they have moved beyond progressing with discrete digital projects, such as mobile applications.

article thumbnail

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Chinese state-sponsored hackers have probed US government networks looking for vulnerable networking devices that could be compromised with exploits for recently disclosed vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? That brings the total for 2020 to more than 20 billion. We logged 134 security incidents in December, which accounted for 148,354,955 breached records. Financial information. In other news….

article thumbnail

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

South African utility provider Eskom is still feeling effects of a cyber security incident (unknown). Australia’s Alinta Energy accused of putting customers’ sensitive information at risk (unknown). Dutch government loses two external hard drive containing personal data (6.9 Data breaches. School District (+24).

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure. COVID-19 considerations and how technology can help.

article thumbnail

Congratulations to Sidley’s Newest Partners!

Data Matters

Congratulations to our 30 colleagues, including Kate Heinzelman and Tomoki Ishiara , for their election to the Sidley Austin partnership , effective January 1, 2020. appeared first on Data Matters Privacy Blog. Tomoki’s practice areas include data privacy law, intellectual property law, entertainment law, litigation and arbitration.

article thumbnail

List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached

IT Governance

In a month that saw the former US president accused of misappropriating classified government documents, there were also a spate of malicious insiders compromising their employer’s systems. If you’re facing a cyber security disaster, IT Governance is here to help. announces security breach (unknown) The Country Club at Woodfield, Inc.