article thumbnail

Supply chain visibility in the energy and utilities industry

IBM Big Data Hub

For the energy and utilities industry (E&U), time is not on their side. But with the right tools, tactics and collaboration, it doesn’t have to be this way. Many water utilities are struggling to obtain computer chips for their water trucks, as well as other vital daily supplies. Visibility.

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries. Wed, 01/13/2021 - 09:42. Cybersecurity challenges. A recent U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI this Earth Day: Top opportunities to advance sustainability initiatives

IBM Big Data Hub

We believe there are three core areas that every organization should focus on: sustainability strategy and reporting; energy transition and climate resilience; and intelligent asset, facility and infrastructure management.

article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Cobalt Strike was created a decade ago by Raphael Mudge as a tool for security professionals. Indeed, the tool can assess vulnerabilities and run penetration tests , while most tools on the market cannot do both. The tool is so powerful that black hat hackers and international threat groups have added it to their arsenal.

article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

For its part, DigiCert has continued to advance it’s DigiCert ONE platform of tools and services to help companies manage their digital certificates and Public Key Infrastructure (PKI.) A starting point Nelson Leveraging advanced tools and embracing emerging best practices is all well and good for the trust leaders.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

Technology reviews can be a temptingly easy way to gain insight into the often impenetrable world of enterprise cybersecurity products, but you need to know how to use them. Ferreting out those biases is important if we’re going to find tools that will make a difference in our IT environments.

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The group also relies on customized versions of open-source tools for C2 communications and to stay under the radar.