Remove Energy and Utilities Remove Meeting Remove Security Remove Tools
article thumbnail

Renewable energy trends and developments powering a cleaner future

IBM Big Data Hub

In a warming world, the transition from fossil fuels to renewable energy is heating up. Global capacity for renewable power generation is expanding more quickly than at any time in the last thirty years, according to the International Energy Agency (IEA). And by 2028, 68 countries will boast renewables as their main source of power.

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. Security of CNI is a national security issue. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

My takeaways: Bungled innovation Digital trust refers to companies meeting the reasonable expectation that the digital services they offer not only protects users, but also upholds societal expectations and values. Factor in business impact: Finally, prioritize security efforts based on the potential business impact.

article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

There are 10 CIP Reliability Standards in-scope for the proposed regulation, but the physical security standard is not in-scope. The ten in-scope standards cover a wide range of security areas, including training, protecting the perimeter, incident response, and supply chain. Background.

article thumbnail

Iran-linked Mint Sandstorm APT targeted US critical infrastructure

Security Affairs

Mint Sandstorm also used custom tools in selected targets, notably organizations in the energy and transportation sectors. In the last stage of the attack, the subgroup deploys a custom malware variant, such as Drokbk or Soldier instead of using publicly available tools and simple scripts. ” concludes Microsoft.

article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

The LookingGlass scoutPrime threat intelligence platform (TIP) integrates enterprise-grade external security threat information with information on internal architecture and security information to create actionable, prioritized risk scores for threats. Security Qualifications STIX & TAXII 2.0 compliant.

article thumbnail

Climate change predictions: Anticipating and adapting to a warming world

IBM Big Data Hub

For instance, when utility officials are aware that a heat wave is on its way, they can plan energy procurement to prevent power outages. An earlier model built through the IBM-NASA partnership became a tool to help scientists map urban heat islands in the United Arab Emirates and monitor reforestation in Kenya.