article thumbnail

Monitoring the dark web to identify threats to energy sector organizations

Security Affairs

Searchlight Cyber researchers warn of threat actors that are offering on the dark web access to energy sector organizations. Dark web intelligence firm Searchlight Cyber published a report that analyzes how threat actors in the dark web prepare their malicious operations against energy organizations.

article thumbnail

Risky Business Aging critical infrastructure networks and advanced attacks

Thales Cloud Protection & Licensing

So far Colonial has been tight lipped about how the hackers gained accessed, but that’s not important. Ransomware is the outcome of the overarching problem of underlying network security shortcomings and unauthorized access to critical infrastructure leaving it vulnerable to cyberattacks. Data Manipulation. Data security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DOE Releases Report on Consumer Privacy Issues Related to Smart Grid Technologies

Hunton Privacy

On October 5, 2010, the Department of Energy (“DOE”) released a report entitled “Data Access and Privacy Issues Related to Smart Grid Technologies.” The idea behind the Smart Grid is that electricity can be delivered more efficiently using data collected through monitoring consumers’ energy use.

article thumbnail

Capgemini and IBM Ecosystem strengthen partnership for Drone-as-a-Service

IBM Big Data Hub

Today, utilities and many other industries use drones extensively to conduct surveys, map assets and monitor business operations. They use drones for tasks as simple as aerial photography or as complex as sophisticated data collection and processing. The global commercial drone market is projected to grow from USD 8.15

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Big energy companies expect action whenever there is a move to end drilling leases for federal lands, in exchange for the tens of millions they contribute to congressional reelection campaigns. We should expect these techniques to get better and their utilization to grow, just as we’ve seen in so many other domains.

article thumbnail

Addressing the network data monetization complexities

IBM Big Data Hub

Second, everyone in the CSP’s organization must be able to leverage the data, irrespective of their technical know-how (of course with the prerequisite that the data access policies allow the access). The analytics layer comes on top of the data layer. Hence, only the consumed data must be collected.

article thumbnail

Public cloud use cases: 10 ways organizations are leveraging public cloud

IBM Big Data Hub

Multi-tenant hosting allows cloud service providers to maximize utilization of their data centers and infrastructure resources to offer services at much lower costs than a company-owned, on-premises data center. Software-as-a-Service (SaaS) is on-demand access to ready-to-use, cloud-hosted application software.

Cloud 100