Remove links-resources
article thumbnail

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)

CGI

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). From a cybersecurity perspective, DERs pose new and unique challenges for utilities.

article thumbnail

The importance of demand response for electricity providers

CGI

Demand response is one of many resources that have been used to satisfy the increasing demand for electricity, but with net energy consumption remaining relatively static in recent years, what is the future role, if any, for demand response? To begin with, the growing use of low-carbon technologies could increase net energy use again.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

As memorialized in the book The Right Stuff , test pilots then had to decide whether to transition into an uncertain-yet-vaguely-familiar new career or continue along their present path. all of which require the same disciplines we utilize when managing our records. Here’s how one organization pulled this off. A Real-World Example.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Because CUPS enables network slicing and can distribute resources throughout the network, its compromise also presents a severe risk. API security will be a critical concern, as APIs linking microservices across multiple virtualized systems are vulnerable to compromise. Also Read: How to Implement Microsegmentation.

Risk 137
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

In a few words, blockchains are advanced databases that timestamp and store clusters of data in immutable virtual blocks linked chronologically. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. What is a Blockchain? Next-Generation Cryptography.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

Its apparent goal is espionage directed against the financial and energy sectors. Banner is an enterprise resource planning solution widely used by colleges and universities to manage student services, registration, grade reporting and financial aid. See more at: [link]. Government agencies are also targeted.

Cloud 40