Remove Blog Remove Education Remove Energy and Utilities
article thumbnail

CISA JCDC Will Focus on Energy Sector

Security Affairs

Strengthen operational integration and collaboration with members of the energy sector. Cyber Risk in the Energy Sector Public utilities have been put to the test as attacks by bad actors have risen sharply in recent years. Q3 ‘22 saw a record number of attacks on the energy market, a trend that is not expected to slow down.

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure. COVID-19 considerations and how technology can help.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked Mint Sandstorm APT targeted US critical infrastructure

Security Affairs

Mint Sandstorm also used custom tools in selected targets, notably organizations in the energy and transportation sectors. The group rapidly weaponized N-day vulnerabilities in popular enterprise applications by using publicly disclosed POCs.

article thumbnail

Electrification: a lottery ticket that utilities must claim

CGI

Electrification: a lottery ticket that utilities must claim. Utilities face a fundamental dilemma. Due to unprecedented pressure to support the move to an energy-efficient and low-carbon system, they face the paradox of encouraging consumers to consume less of what they sell and distribute—electricity. Wed, 09/27/2017 - 07:00.

article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

. “As early as 2022, APT28 actors had utilized compromised EdgeRouters to facilitate covert cyber operations against governments, militaries, and organizations around the world.” APT28 had utilized compromised Ubiquiti EdgeRouters as a command-and-control infrastructure for MASEPIE backdoors. ” reads the joint report.

article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

Energy utilities and oil and gas, but also water utilities and transportation systems, are privileged targets of nation-state actors. ” concludes the report.

article thumbnail

How Red Hat OpenShift on AWS (ROSA) accelerates enterprise modernization initiatives on cloud, delivering business application innovation

IBM Big Data Hub

Similar use cases in other industries include integrated member experience in Healthcare, smart asset performance and security in Energy & Utilities, connected vehicle services in Automotive, operations and process optimization as part of industry 4.0

Cloud 72