Remove Analysis Remove Computer and Electronics Remove Energy and Utilities Remove Tools
article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. In response to such concerns, regulatory agencies are increasing reporting requirements for cyberattacks targeting the energy sector. FERC noted its support for an online reporting tool.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

agencies are approaching the shift, what makes 5G different, and an analysis of deployment to date. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Also read: Best Third-Party Risk Management (TPRM) Tools. How is 5G Different?

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. To get greener, electric utilities must digitally transform. The Slow Transition to Green Energy. Artificial Intelligence.