article thumbnail

Feds Charge Four Russians With Energy Sector Attacks

Data Breach Today

Men Allegedly Targeted Utilities, Nuclear Plants, Oil and Gas Firms The U.S. Department of Justice unsealed two indictments against suspected Russian nation-state actors on conspiracy charges for attacks on the global energy sector. government warns of the chance of cyberattacks as a result of the ongoing conflict between Russia and Ukraine

article thumbnail

Why modern data management and governance is essential in energy and utilities

Collibra

The energy and utilities sector is primed for unprecedented disruption through innovation over the next five years. Across the globe, there is a concerted effort to decarbonize the energy system. This will further require rapid access to data that’s fully governed for use.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s holding back operational excellence in the utility sector?

OpenText Information Management

Once upon a time, the utility industry was a relatively simple place to be. It was all about the safe and consistent generation and distribution of energy with good capacity planning, minimal outages and happy customers. Governments and industry bodies got busy with new legislation … The post What’s holding back operational excellence in the utility sector?

article thumbnail

Coronavirus-themed campaign targets energy sector with PoetRAT

Security Affairs

Threat actors employed the previously-undetected PoetRAT Trojan in a Coronavirus-themed campaign aimed at government and energy sectors. . The malware infected ICS and SCADA systems used to control the wind turbines within the renewable energy sector.

article thumbnail

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)

CGI

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). DERs are smaller power-generation resources, usually located on the consumer side, that provide energy where it is needed. From a cybersecurity perspective, DERs pose new and unique challenges for utilities.

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries.

article thumbnail

Hackers targeted ICS/SCADA systems at water facilities, Israeli government warns

Security Affairs

The Israeli government has issued an alert to organizations in the water sector following a series of cyberattacks that targeted the water facilities. ” reads the alert issued by the Israeli government.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. To get greener, electric utilities must digitally transform.

article thumbnail

European cooperation on flexibility to accelerate the energy transition

CGI

European cooperation on flexibility to accelerate the energy transition. Early in September, we invited a number of our clients from around Europe to participate in a roundtable discussion on energy flexibility. Read more about energy flexibility.

article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

On January 25, 2019, the North American Electric Reliability Corporation (“NERC”) asked the Federal Energy Regulatory Commission (“FERC”) to approve a settlement issuing a record $10 million fine against an unidentified utility resulting from violations of critical infrastructure protection standards (“CIP”) occurring mostly between 2015 and 2018 (referred to hereafter as the “Settlement Agreement”). Cybersecurity Energy Enforcement Information Security National Security

article thumbnail

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates

CGI

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. Some utilities even provide vehicle-to-grid services and home energy management systems to help consumers manage their electricity usage. To seize these new business opportunities, utilities are increasing investments in new products and services, making it the second largest IT spend driver and a top innovation investment (73%) over the next three years.

article thumbnail

DHS Officials: Hundreds of US Utility Victims Infiltrated by Russian Hackers

Dark Reading

Federal government officials up their count of US energy sector victims from dozens to hundreds, according to a Wall Street Journal report

article thumbnail

Threat actors breached the network of the Italian oil company ENI

Security Affairs

The Italian energy sector appears to be under attack, over the weekend, Italy’s energy agency Gestore dei Servizi Energetici SpA was hit by a cyber attack. GSE is the government agency that operates the Italian electricity market.

article thumbnail

US indicted 4 Russian government employees for attacks on critical infrastructure

Security Affairs

has indicted four Russian government employees for their involvement in attacks on entities in critical infrastructure. According to the indictment, the campaigns against the energy sector campaign involved two phases. government agencies such as the Nuclear Regulatory Commission.

article thumbnail

Strategize your next move to become a utilities leader, delivering value at scale and pace

CGI

Strategize your next move to become a utilities leader, delivering value at scale and pace. Additionally, utilities leaders say their IT investments have increased, and they have moved beyond progressing with discrete digital projects, such as mobile applications.

article thumbnail

Tiao Discusses Utilities’ Concerns in Sharing Information with the Government

Hunton Privacy

Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. Utilities Wary of Sharing Grid Risks,” Tiao talked about the recent leak to The Wall Street Journal of a sensitive internal memo at the Federal Energy Regulatory Commission that revealed potential vulnerabilities in the electricity grid. View the Platts Energy Week feature with Paul Tiao.

article thumbnail

There’s More to erwin Data Governance Automation Than Meets the AI

erwin

Prashant Parikh, erwin’s Senior Vice President of Software Engineering, talks about erwin’s vision to automate every aspect of the data governance journey to increase speed to insights. The clear benefit is that data stewards spend less time building and populating the data governance framework and more time realizing value and ROI from it. . Although AI and ML are massive fields with tremendous value, erwin’s approach to data governance automation is much broader.

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure.

article thumbnail

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

Indeed, in just the past few years, a variety of cyber adversaries have attacked financial institutions, social media sites, a movie studio, hospital systems, a peer-to-peer ridesharing company, the Democratic National Committee, hotel chains, city governments, educational institutions, telecommunications and energy utilities, prominent retailers, manufacturers, and even the mobile app of a well-known coffee and donut chain.

article thumbnail

Electrification: a lottery ticket that utilities must claim

CGI

Electrification: a lottery ticket that utilities must claim. Utilities face a fundamental dilemma. Due to unprecedented pressure to support the move to an energy-efficient and low-carbon system, they face the paradox of encouraging consumers to consume less of what they sell and distribute—electricity. Is there a lottery ticket for utilities around the corner ? However, this will not happen without a strong commitment and effort from utilities.

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise. all of which require the same disciplines we utilize when managing our records. Information Governance

article thumbnail

TSA Issues Directive to Enhance Pipeline Cybersecurity

Data Matters

The Cybersecurity and Infrastructure Security Agency (“CISA”), a unit of the Department of Homeland Security, has already been tasked with producing a cloud-service governance framework and a standard incident response playbook for federal agencies pursuant to the Biden administration’s recently issued Executive Order on cybersecurity. Unlike the Executive Order, which covered government agencies and their suppliers, this Directive focuses on the activity of private sector entities.

article thumbnail

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Security Affairs

Nigerian cyber gang SilverTerrier, specialized in BEC attacks, used COVID-19 lures in recent attacks on healthcare and government organizations. The post SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations appeared first on Security Affairs.

article thumbnail

Securing the electricity network: Understanding the unique ICS environment of a utility

CGI

Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks. Digitalization is altering the way information is collected, used and processed in the energy system.

article thumbnail

Department of Energy Announces New Efforts in Energy Sector Cybersecurity

Hunton Privacy

On May 14, 2018, the Department of Energy (“DOE”) Office of Electricity Delivery & Energy Reliability released its Multiyear Plan for Energy Sector Cybersecurity (the “Plan”). The Plan is significantly guided by DOE’s 2006 Roadmap to Secure Control Systems in the Energy Sector and 2011 Roadmap to Achieve Energy Delivery Systems Cybersecurity. Multiyear Plan for Energy Sector Cybersecurity. energy sector. electric utilities participate in CRISP.

article thumbnail

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The findings and perspectives are based on 1,400 in-person interviews with business and IT executives, of which 127 are from the utilities industry. So where do utilities stand?

article thumbnail

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Government agencies.”

article thumbnail

Thinking Out Loud: Potential Information

John Battelle's Searchblog

image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion. Potential energy is energy stored inside a body that has the potential to create motion. I like to think of potential energy as a force that’s waiting to become kinetic.

article thumbnail

List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached

IT Governance

In a month that saw the former US president accused of misappropriating classified government documents, there were also a spate of malicious insiders compromising their employer’s systems. If you’re facing a cyber security disaster, IT Governance is here to help.

article thumbnail

Actions Target Russian Govt. Botnet, Hydra Dark Market

Krebs on Security

Federal Bureau of Investigation (FBI) says it has disrupted a giant botnet built and operated by a Russian government intelligence unit known for launching destructive cyberattacks against energy infrastructure in the United States and Ukraine. energy facilities. The U.S.

Marketing 197
article thumbnail

Episode 234: Rep. Jim Langevin on Cyber Policy in an Age of Political Polarization

The Security Ledger

That includes $1 billion in grants to improve state and local government cybersecurity and a quarter billion dollars each to fund cyber improvements in rural and municipal utilities and to develop advanced cybersecurity applications and technologies for the energy sector. .

article thumbnail

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

South African utility provider Eskom is still feeling effects of a cyber security incident (unknown). Australia’s Alinta Energy accused of putting customers’ sensitive information at risk (unknown). Dutch government loses two external hard drive containing personal data (6.9

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog. What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded?

article thumbnail

Russia Sanctions May Spark Escalating Cyber Conflict

Krebs on Security

The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure.

article thumbnail

Quest EMPOWER: Take a Sneak Peak of Virtual Day One

erwin

Day one will be focused on data intelligence and governance. Speakers will cover data intelligence and governance on the first day of the summit. In this session, you will hear first-hand from Ivo Kuijlaars, Data Architecture Lead at Enexis Groep, a Netherlands-based energy supplier.

article thumbnail

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

Security Affairs

Russia-linked cyber-espionage group hacked the Ukrainian energy company Burisma at the center of the impeachment trial of US President Donald Trump. The post Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

article thumbnail

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. unknown) Criminal hackers attack Ehrmann, demand millions in ransom (unknown) Criminal hackers attack Energy Hamburg Radio (unknown) Chemical distribution company Brenntag paid a $4.4

article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. If you or your enterprise is engaged in the energy or manufacturing sectors, cyber threat preparation and monitoring is your first line of defense against bad actors.

article thumbnail

Recent Federal Government Activity on Cybersecurity

Hunton Privacy

This client alert focuses on some of those efforts, including the Federal Energy Regulatory Commission’s (“FERC’s”) creation of a new cybersecurity office, North American Electric Reliability Corporation (“NERC”) action on cybersecurity Critical Infrastructure Protection (“CIP”) standards, continuing legislative developments concerning cybersecurity and anticipated White House executive orders on cybersecurity.

Privacy 40
article thumbnail

Everest gang demands $200K for data stolen from South Africa state-owned electricity company ESKOM

Security Affairs

Eskom transforms inputs from the natural environment – coal, nuclear, fuel, diesel, water, and wind – into more than 90% of the energy supplied to a wide range of customers in South Africa and the Southern African Development Community (SADC) region.