Remove Course Remove Energy and Utilities Remove Examples Remove Presentation
article thumbnail

Thinking Out Loud: Potential Information

John Battelle's Searchblog

image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion. Potential energy is energy stored inside a body that has the potential to create motion.

article thumbnail

A potential solution for protecting customer privacy when sharing smart meter data

CGI

This is because smart meters are widely regarded as a key to reducing both energy consumption and emission levels. While the simplest solution to avoid this type of risk lies in not sharing your metering data with anyone, including your utility provider, which is easier said than done. in the utilities sector. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs. The survey should have representation from categories such as: Company size: small to large Industry vertical: healthcare, energy, etc.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. For example: Take a screenshot of the error tweet. This guidance utilizes principles that can be adopted by a variety of institutions, not just Federal agencies.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

The flipside is, you create as a good example over here, what happens is somebody's attacking my country. I can manipulate the data in a database, for example, financial or transactional. So just like a football, right wide receiver, you have a quarterback, you have your present. If you want to get to put the energy into it.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Of course our guest on this episode, he already knew all that. It's individual pieces of it that fall apart and become a nightmare for that company or that utility or whatever. But this attack is just the latest example of ransomware incidents in the US. And how might we defend ourselves? My name is Tom Van Norman.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Its apparent goal is espionage directed against the financial and energy sectors. First, of course, is the now-fixed bug. The company believes that criminals are, quote, "utilizing bots to submit fraudulent admissions applications and obtain institution email addresses through admission application portals," quote.

Cloud 52