article thumbnail

Supply chain visibility in the energy and utilities industry

IBM Big Data Hub

For the energy and utilities industry (E&U), time is not on their side. Facts about the energy and utilities industry Transformer prices have doubled, while the average lead time for delivery has at least tripled from what it was two years earlier, reaching 52 weeks in some cases. Visibility.

article thumbnail

The journey to a mature asset management system

IBM Big Data Hub

This blog series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. Cybersecurity reduces risk exposure for cyberattacks on digitally connected assets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries. Wed, 01/13/2021 - 09:42. Cybersecurity challenges. A recent U.S.

article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

The CIP version 5 Standards implement a tiered approach to categorize assets, identifying them as high, medium, or low risk to the operation of the bulk electric system if compromised. Background. The CIP Reliability Standards require entities to comply with specific requirements to safeguard critical cyber assets. The proposed incentives.

article thumbnail

The advantages and disadvantages of renewable energy

IBM Big Data Hub

New developments in renewable energy are making headlines and inspiring hope in communities worldwide, from a remote Arctic village working to harness solar and wind power under challenging conditions to a U.S. Air Force base planning an advanced, utility-scale geothermal power system. Let’s take a look at both.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

That pace is unlikely to slow down over the coming years; Pagely noted that organizations are still turning to IoT devices as a way to automate and optimize their business processes as well as save on energy costs. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122
article thumbnail

Threat actors breached the network of the Italian oil company ENI

Security Affairs

Italian oil giant company Eni disclosed a security breach, threat actors gained access to its network, but according to the company the intrusion had minor consequences because it was quickly detected. Ransomware is a type of malware that locks computers and blocks access to files in lieu of a payment.