Remove Communications Remove Energy and Utilities Remove Examples Remove Security
article thumbnail

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)

CGI

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). From a cybersecurity perspective, DERs pose new and unique challenges for utilities.

article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

power grid because “many of the violations involved long durations, multiple instances of noncompliance, and repeated failures to implement physical and cyber security protections.” Critically, the utility had in place an internal compliance program at the time of the violations. Settlement Agreement at 12.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Delivering on the benefits of data: How utilities can get the first-mover advantage

CGI

Delivering on the benefits of data: How utilities can get the first-mover advantage. With the energy transition underway, there is a similar bold “rethink” taking place in the way energy companies view solutions, particularly around managing data. ravi.kumarv@cgi.com. Tue, 04/16/2019 - 04:29. Data is fuelling the future.

article thumbnail

5G use cases that are transforming the world

IBM Big Data Hub

Bandwidth: By utilizing a broader spectrum of radio frequencies than previous wireless networks, 5G networks can transmit on a much wider range of bandwidths. Unlike previous wireless networks, this new capability allows users to do more things remotely with greater security than ever before.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

based cyber intelligence firm Hold Security has been monitoring the communications between and among a businesses ID theft gang apparently operating in Georgia and Florida but targeting businesses throughout the United States. For the past several months, Milwaukee, Wisc. ” PHANTOM OFFICES. . ” PHANTOM OFFICES.

article thumbnail

The future of 5G: What to expect from this transformational technology

IBM Big Data Hub

This is largely due to its ability to move large volumes of data swiftly and securely between connected devices at speeds never achieved before. Private networks In addition to network slicing, 5G allows users to create private networks with enhanced personalization and security.

Cloud 61
article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs. The survey should have representation from categories such as: Company size: small to large Industry vertical: healthcare, energy, etc.