Remove Blog Remove Energy and Utilities Remove Security Remove Tools
article thumbnail

Renewable energy trends and developments powering a cleaner future

IBM Big Data Hub

In a warming world, the transition from fossil fuels to renewable energy is heating up. Global capacity for renewable power generation is expanding more quickly than at any time in the last thirty years, according to the International Energy Agency (IEA). And by 2028, 68 countries will boast renewables as their main source of power.

article thumbnail

Optimizing energy production with the latest smart grid technologies

IBM Big Data Hub

New technologies are shaping the way we produce, distribute and consume energy. alone has installed nearly 10,000 electricity generation units, connected by more than 300,000 miles of transmission lines and capable of generating over a million megawatts of energy. Historically, the power grid has been a one-way street.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Cobalt Strike was created a decade ago by Raphael Mudge as a tool for security professionals. Indeed, the tool can assess vulnerabilities and run penetration tests , while most tools on the market cannot do both. The tool is so powerful that black hat hackers and international threat groups have added it to their arsenal.

article thumbnail

Examples and uses of GIS

IBM Big Data Hub

Urban planning Governments use GIS data and GIS-based solutions for urban planning: zoning and land use projects, natural disaster and health event response, roadway system and building design, utility distribution, energy production, and waste and resource management.

article thumbnail

The advantages and disadvantages of renewable energy

IBM Big Data Hub

New developments in renewable energy are making headlines and inspiring hope in communities worldwide, from a remote Arctic village working to harness solar and wind power under challenging conditions to a U.S. Air Force base planning an advanced, utility-scale geothermal power system. Let’s take a look at both.

article thumbnail

Iran-linked Mint Sandstorm APT targeted US critical infrastructure

Security Affairs

Mint Sandstorm also used custom tools in selected targets, notably organizations in the energy and transportation sectors. In the last stage of the attack, the subgroup deploys a custom malware variant, such as Drokbk or Soldier instead of using publicly available tools and simple scripts. ” concludes Microsoft.

article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

Files leaked by Russian IT contractor NTC Vulkan show that Russia-linked Sandworm APT requested it to develop offensive tools. Documents leaked from Russian IT contractor NTC Vulkan show it was likely involved in the development of offensive tools. ” reads the report published by Mandiant. ” concludes the report.