What’s holding back operational excellence in the utility sector?

OpenText Information Management

Once upon a time, the utility industry was a relatively simple place to be. It was all about the safe and consistent generation and distribution of energy with good capacity planning, minimal outages and happy customers. Then it all changed. Governments and industry bodies got busy with new legislation … The post What’s holding back operational excellence in the utility sector?

Coronavirus-themed campaign targets energy sector with PoetRAT

Security Affairs

Threat actors employed the previously-undetected PoetRAT Trojan in a Coronavirus-themed campaign aimed at government and energy sectors. . The malware infected ICS and SCADA systems used to control the wind turbines within the renewable energy sector.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hackers targeted ICS/SCADA systems at water facilities, Israeli government warns

Security Affairs

The Israeli government has issued an alert to organizations in the water sector following a series of cyberattacks that targeted the water facilities. ” reads the alert issued by the Israeli government.

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries.

Document Storage for the Energy Industry

Armstrong Archives

If you work in the energy industry, it comes as no surprise that it’s one of the most heavily regulated. To comply with government regulations, an energy company might have tens of thousands of documents that need to be physically stored, scanned or destroyed.

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)


Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). DERs are smaller power-generation resources, usually located on the consumer side, that provide energy where it is needed. From a cybersecurity perspective, DERs pose new and unique challenges for utilities.

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

On January 25, 2019, the North American Electric Reliability Corporation (“NERC”) asked the Federal Energy Regulatory Commission (“FERC”) to approve a settlement issuing a record $10 million fine against an unidentified utility resulting from violations of critical infrastructure protection standards (“CIP”) occurring mostly between 2015 and 2018 (referred to hereafter as the “Settlement Agreement”). There is no indication that FERC will not approve it.

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates


Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. Some utilities even provide vehicle-to-grid services and home energy management systems to help consumers manage their electricity usage. To seize these new business opportunities, utilities are increasing investments in new products and services, making it the second largest IT spend driver and a top innovation investment (73%) over the next three years.

Strategize your next move to become a utilities leader, delivering value at scale and pace


Strategize your next move to become a utilities leader, delivering value at scale and pace. Each year, we meet face-to-face with business and IT executives around the world to gather their perspectives on the trends affecting their enterprises.

There’s More to erwin Data Governance Automation Than Meets the AI


Prashant Parikh, erwin’s Senior Vice President of Software Engineering, talks about erwin’s vision to automate every aspect of the data governance journey to increase speed to insights. The clear benefit is that data stewards spend less time building and populating the data governance framework and more time realizing value and ROI from it. . Although AI and ML are massive fields with tremendous value, erwin’s approach to data governance automation is much broader.

Key strategies and technologies to help utilities respond to a “storm” never seen before


Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure.

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

In the late 1950s, the United States invited its top test pilots to apply to become the nation’s first astronauts. Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise.

TSA Issues Directive to Enhance Pipeline Cybersecurity

Data Matters

The Cybersecurity and Infrastructure Security Agency (“CISA”), a unit of the Department of Homeland Security, has already been tasked with producing a cloud-service governance framework and a standard incident response playbook for federal agencies pursuant to the Biden administration’s recently issued Executive Order on cybersecurity. Unlike the Executive Order, which covered government agencies and their suppliers, this Directive focuses on the activity of private sector entities.

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Security Affairs

Nigerian cyber gang SilverTerrier, specialized in BEC attacks, used COVID-19 lures in recent attacks on healthcare and government organizations. SilverTerrier has been active since at least 2014, it is a collective of over hundreds of individual threat actors.

Electrification: a lottery ticket that utilities must claim


Electrification: a lottery ticket that utilities must claim. Utilities face a fundamental dilemma. Due to unprecedented pressure to support the move to an energy-efficient and low-carbon system, they face the paradox of encouraging consumers to consume less of what they sell and distribute—electricity. Is there a lottery ticket for utilities around the corner ? However, this will not happen without a strong commitment and effort from utilities.

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Government agencies.”

Securing the electricity network: Understanding the unique ICS environment of a utility


Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks. While IT systems are used to manage information, an ICS environment is used to control physical processes and objects.

Department of Energy Announces New Efforts in Energy Sector Cybersecurity

Hunton Privacy

On May 14, 2018, the Department of Energy (“DOE”) Office of Electricity Delivery & Energy Reliability released its Multiyear Plan for Energy Sector Cybersecurity (the “Plan”). The Plan is significantly guided by DOE’s 2006 Roadmap to Secure Control Systems in the Energy Sector and 2011 Roadmap to Achieve Energy Delivery Systems Cybersecurity. Multiyear Plan for Energy Sector Cybersecurity. energy sector.

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI


Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The findings and perspectives are based on 1,400 in-person interviews with business and IT executives, of which 127 are from the utilities industry. So where do utilities stand?

Iran-linked APT33 updates infrastructure following its public disclosure

Security Affairs

The Iran-linked cyberespionage group APT33 has updated its infrastructure after the publication of a report detailing its activities. The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation industry and energy companies with connections to petrochemical production. Now, a ccording to researchers from Recorded Future, since the publishing of the report, APT33 (aka Elfin ) has updated its infrastructure.

Thinking Out Loud: Potential Information

John Battelle's Searchblog

image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion. Potential energy is energy stored inside a body that has the potential to create motion. I like to think of potential energy as a force that’s waiting to become kinetic. GE’s already on it.

What the Blockchain Taught Us about IT Security

Security Affairs

It is not just about security, but in utilizing Blockchain to secure your company and your information. With how fast technology is improving and being included in everyday activities or jobs to make them fast and efficient, it is important to make sure you are secured, especially when on the internet. But it is not just about security, but in utilizing Blockchains to secure your company and your information. What Does IT Stand For? Energy Efficiency.

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

It’s more specific than generic phishing attempts and often targets a single person or company. Many may find it takes time to adjust to the changes. People want to learn as much as they can about it, and their haste may result in them clicking on links without thinking.

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

Security Affairs

Russia-linked cyber-espionage group hacked the Ukrainian energy company Burisma at the center of the impeachment trial of US President Donald Trump. and its relationship with the former board member Hunter Biden, the son of Joe Biden.

Operators behind Dark Caracal are still alive and operational

Security Affairs

The Dark Caracal is an APT group associated with the Lebanese General Directorate of General, in recent attacks it employed a new version of a 13-year-old backdoor Trojan dubbed Bandook.

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. If you or your enterprise is engaged in the energy or manufacturing sectors, cyber threat preparation and monitoring is your first line of defense against bad actors.

Recent Federal Government Activity on Cybersecurity

Hunton Privacy

This client alert focuses on some of those efforts, including the Federal Energy Regulatory Commission’s (“FERC’s”) creation of a new cybersecurity office, North American Electric Reliability Corporation (“NERC”) action on cybersecurity Critical Infrastructure Protection (“CIP”) standards, continuing legislative developments concerning cybersecurity and anticipated White House executive orders on cybersecurity.

FBI confirmed that Darkside ransomware gang hit Colonial Pipeline

Security Affairs

We continue to work with the company and our government partners on the investigation.” million barrels of refined gasoline and jet fuel each day up the East Coast from Texas to New York, it covers 45 percent of the East Coast’s fuel supplies. The U.S.

UK, US agencies warn of large-scale brute-force attacks carried out by Russian APT

Security Affairs

US and UK cybersecurity agencies said today that a Russian military cyber unit has been behind a series of brute-force attacks that have targeted the cloud IT resources of government and private sector companies across the world.

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Jeremy Samide, CEO of Stealthcare , a Cleveland-based cyberthreats intelligence gathering consultancy, is in the midst of it. And it might not be Iran directly retaliating alone. When it comes to cyber warfare, America is no shrinking violet, of course.

Sustainability: The COVID Window of Opportunity


COVID-19 is causing immense human and economic suffering, but one surprise is its positive impact on the environment. The world’s digital infrastructure providers need to act fast to both capitalize on this and make it stick. . We know we can do it .

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

From taking a shower, to brewing your coffee, and watching the news, your morning routine is fueled by the energy sector. But the energy sector also underpins our emergency and response systems, our hospitals and healthcare, our schools, our businesses, and virtually everything we do as a society. Unfortunately, the energy sector is of great interest to cyber attackers today. It’s even possible that the attackers didn’t even know they were targeting a power utility.

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Unfortunately, far too many entrepreneurs are simply unaware of the threat or don’t know how to be watchful for it. Dun & Bradstreet said that so far this year it has received over 4,700 tips and leads where business identity theft or malfeasance are suspected.

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

billion IoT devices in use as of 2017, half are consumer gadgets, like smart TVs, speakers, watches, baby cams and home thermostats; much of the rest is made up of things like smart electric meters and security cameras in corporate and government use. This will be led by the manufacturing, consumer, transportation and utilities sectors. Industry standards-setting bodies and government regulators recognize what’s at stake.

IoT 142

Leveraging Data From Smart Devices in Hospitals: A Talk With Innovation Executive and Ph.D., Sam Hanna


associate dean at American University and executive adviser at Alphabet and Amazon, to talk about his thoughts on leveraging data from smart devices and sensors, as well as the part storage and data governance will play in healthcare’s data-driven future.

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Whether it’s a misconfiguration or inadequate security or patching , new vulnerabilities found in IoT systems seem to make the news every week. Because CUPS enables network slicing and can distribute resources throughout the network, its compromise also presents a severe risk.

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

As the tide turns and more organizations find ways to implement blockchain, time will tell if it’s as influential in improving business processes as the hype has led us to believe. KSI was designed specifically to help the Estonian government implement a validated proof of operations.

Netwalker ransomware hit K-Electric, the major Pakistani electricity provider

Security Affairs

K-Electric (KE) (formerly known as Karachi Electric Supply Company / Karachi Electric Supply Corporation Limited) is a Pakistani investor-owned utility managing all three key stages – generation, transmission and distribution – of producing and delivering energy to consumers.

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

However, it bears reminding that most breaches take 100 days or more to be discovered, so we could be seeing the effects of the coronavirus for months after our everyday lives get back to normal. Boots says its Advantage Card database was hit by hackers (150,000).

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

That pace is unlikely to slow down over the coming years; Pagely noted that organizations are still turning to IoT devices as a way to automate and optimize their business processes as well as save on energy costs. Concurrently, IoT-powered products could malfunction in a way that threaten customers with injuries, economic losses, and environmental damage, as could be the case with IIoT in the energy sector with oil, gas, and utility entities.