article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 billion metric tons of it in 2020. And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. The Slow Transition to Green Energy.

article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. In response to such concerns, regulatory agencies are increasing reporting requirements for cyberattacks targeting the energy sector. 147, at 37727-36741), the Federal Energy Regulatory Commission (FERC), which regulates the energy sector, recently directed that the power industry’s regulating body, the North American Electric Reliability Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog. What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded?

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Unfortunately, far too many entrepreneurs are simply unaware of the threat or don’t know how to be watchful for it. Dun & Bradstreet said that so far this year it has received over 4,700 tips and leads where business identity theft or malfeasance are suspected.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Albert Einstein once observed that “pure mathematics is, in its way, the poetry of logical ideas.” Related: How Multi Party Computation is disrupting encrypti on An accomplished violinist, Einstein, no doubt, appreciated the symmetry of his metaphor. Our top math geniuses point to iO as a cornerstone needed to unleash the full potential of artificially intelligent (AI) programs running across highly complex and dynamic cloud platforms, soon to be powered by quantum computers.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Whether it’s a misconfiguration or inadequate security or patching , new vulnerabilities found in IoT systems seem to make the news every week.

article thumbnail

A greener library: The Bodleian?s push for sustainability

CILIP

These roles that support a building and its operation can sometimes feel a bit thankless, but we have the privilege of knowing our efforts help to preserve amazing collections for access and use, as well as protecting wonderful buildings. Turning off lights and electronic equipment at night.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. It's estimated that within the first year, over half the homes in the United States had spark meters installed. I mean, on the one hand, we're saying it's a national priority.