Remove Energy and Utilities Remove Presentation Remove Security Remove Tools
article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

DigiCert’s survey presents hard evidence that trust can be the basis of a winning business model. For its part, DigiCert has continued to advance it’s DigiCert ONE platform of tools and services to help companies manage their digital certificates and Public Key Infrastructure (PKI.) But what about the laggards?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

There are 10 CIP Reliability Standards in-scope for the proposed regulation, but the physical security standard is not in-scope. The ten in-scope standards cover a wide range of security areas, including training, protecting the perimeter, incident response, and supply chain. Background.

article thumbnail

OpenText Summit | Houston Energy 2024 summary & key takeaways

OpenText Information Management

Last week industry leaders, experts, and innovators gathered at the Houston Aquarium for the OpenText Energy Summit in Houston , a pivotal event driving conversations on the intersection of artificial intelligence, information management, and energy sector dynamics.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

article thumbnail

Ragnar Ransomware encrypts files from virtual machines to evade detection

Security Affairs

Ragnar Locker deploys Windows XP virtual machines to encrypt victim’s files, the trick allows to evaded detection from security software. Crooks always devise new techniques to evade detection, the Ragnar Locker is deploying Windows XP virtual machines to encrypt victim’s files while bypassing security measures.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

Ferreting out those biases is important if we’re going to find tools that will make a difference in our IT environments. For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs.