Remove Computer and Electronics Remove Energy and Utilities Remove Industry Remove Security
article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

Department of Homeland Security (DHS) held public briefings about an attempt by a state-sponsored Russian hacking group to target control systems for U.S. DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. On July 23 and 25, 2018, the U.S.

article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

A string of Governmental announcements have increasingly sounded the alarm about the growing cybersecurity threat facing the energy sector. Among other things, these reports have announced that state-sponsored cyber actors have successfully gained access to the control rooms of utilities. Procedural History.

Risk 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

We logged 134 security incidents in December, which accounted for 148,354,955 breached records. What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? That brings the total for 2020 to more than 20 billion. Financial information. In other news…. Cyber attacks.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Source (New) Engineering Japan Yes >5 TB Array Networks Source (New) Cyber security USA Yes 2.5 TB Turtlemint Source (New) Insurance India Yes 1,800,000 Chunghwa Telecom Source (New) Telecoms Taiwan Yes 1.7 The ICO has issued an enforcement notice and a warning to the Home Office. The fine is the largest the Garante has issued to date.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. National Strategy to Secure 5G (NTIA).

Risk 137
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Mobile network database breach exposes 750 million Indians’ personal data The Indian security company CloudSEK claims to have found the personal data of 750 million Indians for sale on an “underground forum”. Computer SPRL Source (New) IT services Belgium Yes 1,000,000 AerCap Source (New) Transport Ireland Yes 1 TB MBC Law Professional Corp.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. To get greener, electric utilities must digitally transform. The Slow Transition to Green Energy. Artificial Intelligence.