article thumbnail

AI this Earth Day: Top opportunities to advance sustainability initiatives

IBM Big Data Hub

To drive real change, it’s crucial for individuals, industries, organizations and governments to work together, using data and technology to uncover new opportunities that will help advance sustainability initiatives across the globe. This Earth Day, we are calling for action to conserve our scarcest resource: the planet.

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

The Evolving Cybersecurity Threats to Critical National Infrastructure andrew.gertz@t… Mon, 10/23/2023 - 14:07 Cyberattacks on critical vital infrastructure can have disastrous results, forcing governments and regulatory bodies to pay close attention to intensifying the efforts to safeguard these industries. And only a mere 2.6%

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Climate change predictions: Anticipating and adapting to a warming world

IBM Big Data Hub

For instance, when utility officials are aware that a heat wave is on its way, they can plan energy procurement to prevent power outages. 3 While the transition from fossil fuels to clean, renewable energy sources is already underway, accelerating this transition could help further limit emissions, even amid rising global energy needs.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

Security breaches in this sector can be incredibly disruptive to society and are attracting considerable attention from governments and regulatory bodies around the world. The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.

article thumbnail

Digital sobriety

Everteam

Analyzing , Information Governance , Records Management. A little history… EDM, ECM, Governance, Web 2.0, What we can say for sure is that manufacturing user equipment is the most expensive, from both an energy and an environmental viewpoint. Apart from renewable energies, it is the energy with the best carbon footprint.

article thumbnail

90% of critical infrastructure providers have fallen victim to a cyber attack since 2017

IT Governance

The anonymous survey covered the utility, energy, health and transport sectors – industries renowned for keeping their activities secret because they store highly sensitive information and are responsible for essential services.