article thumbnail

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)

CGI

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). From a cybersecurity perspective, DERs pose new and unique challenges for utilities. Mon, 06/17/2019 - 05:09.

article thumbnail

MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruition

The Last Watchdog

For instance, very visibly over the past decade, Internet of Things ( IoT ) computing devices and sensors have become embedded everywhere. Smart devices and IoT systems are beginning to interconnect with each other and this is only going to continue.”. Energy at the edges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI this Earth Day: Top opportunities to advance sustainability initiatives

IBM Big Data Hub

We believe there are three core areas that every organization should focus on: sustainability strategy and reporting; energy transition and climate resilience; and intelligent asset, facility and infrastructure management. We also know that using AI requires vast amounts of energy and data.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Critical Success Factors to Widespread Deployment of IoT. Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Threat vectors on IoT.

IoT 96
article thumbnail

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

IT Governance

8 TB of data exfiltrated from Advantage Group International Following an outage affecting its leak site (see the ‘Enforcement’ section below), the ALPHV/BlackCat ransomware group is listing only a single incident: a data breach affecting the business management consultant Advantage Group International.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Allegedly developed by US and Israeli operatives, Stuxnet was discovered circulating through Iranian nuclear energy facilities in 2010.

article thumbnail

IBM and business partner bring intelligent equipment maintenance to automotive company with IBM Maximo

IBM Big Data Hub

Maintenance workers need to consume a lot of energy to check up the equipment data to understand and learn new skills, resulting in not only low maintenance efficiency, but also leading to a decline in employee satisfaction and loyalty. production systems, IoT platforms etc.) of the client to optimize data sharing and business synergy.