Remove category
Remove Compliance Remove Cybersecurity Remove Energy and Utilities Remove Security
article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

These standards are results-based and do not specify a technology or method to achieve compliance, instead leaving it up to the entity to decide how best to comply. There are 10 CIP Reliability Standards in-scope for the proposed regulation, but the physical security standard is not in-scope. 8309-8325 (Feb. 5, 2021).). Background.

article thumbnail

TSA Issues Directive to Enhance Pipeline Cybersecurity

Data Matters

Department of Homeland Security’s Transportation Security Administration (“TSA”) issued a Security Directive , “Enhancing Pipeline Cybersecurity” on May 28, laying out new cybersecurity requirements for operators of liquids and natural gas pipelines and LNG facilities designated as critical infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. As a bonus, many of these tools are free to access and have specialized feeds that focus on different industries and sectors.

article thumbnail

Infosource Global Capture & IDP Vertical Market Analysis 2022-2023 Update

Info Source

These solutions are designed to acquire, classify, validate, and convert business inputs into valuable data for use in business transactions, analytics, records management, discovery, and compliance applications. All business inputs are interpreted to understand the content, and where and why it is needed.