Remove Energy and Utilities Remove Government Remove Paper Remove Security
article thumbnail

OpenText Summit | Houston Energy 2024 summary & key takeaways

OpenText Information Management

Last week industry leaders, experts, and innovators gathered at the Houston Aquarium for the OpenText Energy Summit in Houston , a pivotal event driving conversations on the intersection of artificial intelligence, information management, and energy sector dynamics.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. To get greener, electric utilities must digitally transform. The Slow Transition to Green Energy. Artificial Intelligence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Document Storage for the Energy Industry

Armstrong Archives

If you work in the energy industry, it comes as no surprise that it’s one of the most heavily regulated. To comply with government regulations, an energy company might have tens of thousands of documents that need to be physically stored, scanned or destroyed. Utilize a company that will inventory items with barcoding.

article thumbnail

Securing the electricity network: Understanding the unique ICS environment of a utility

CGI

Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks.

article thumbnail

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

Security Affairs

The New York Times, citing current and former government officials, revealed that the United States planted a potentially destructive malware in Russia’s electric power grid. ” The hacking operations aimed at warning the Russian Government about the cyber capabilities of the U.S. Trump (@realDonaldTrump) June 16, 2019.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding. There is value in offense and you get some utility such as access, intelligence, or control.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding. There is value in offense and you get some utility such as access, intelligence, or control.