Remove 10
article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

There are 10 CIP Reliability Standards in-scope for the proposed regulation, but the physical security standard is not in-scope. Commission staff explained that, in the future, these voluntary actions taken by public utilities, if proven beneficial, could be the basis of future CIP Reliability Standards that would be mandatory.”

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

For 2020, the company estimates an overall 258 percent spike in the crime. To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills. ” PHANTOM OFFICES.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Balancing speed and stability to reinvent utility operations for the energy transition

CGI

Balancing speed and stability to reinvent utility operations for the energy transition. The COVID-19 pandemic has underscored our need for a reliable energy supply, which is something we typically take for granted. Today, utilities must respond to rapidly changing demand profiles caused by stay-at-home orders.

article thumbnail

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. Wed, 10/31/2018 - 03:39. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Because CUPS enables network slicing and can distribute resources throughout the network, its compromise also presents a severe risk. Exponential growth in capabilities like lower latency, more substantial bandwidth, and higher average speeds present a new world of opportunities for mobile connectivity. How 5G Goes Beyond 4G.

Risk 137
article thumbnail

DB2 Dispatch from Vegas: IOD, Day One

Robert's Db2

It's expected that by 2020 that number will be around 35 zettabytes (a zettabyte is 1 sextillion bytes, or a billion terabytes). Robert was joined on stage by IT executives from Visa International (Mike Dreyer) and CenterPoint Energy (Steve Pratt). That's a 44X increase in 11 years.