Remove Energy and Utilities Remove Government Remove Privacy
article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. IOWN is all about supporting increased bandwidth, capacity and energy efficiency. Each sensor in each shroud must be uniquely smart and use next to zero energy.

article thumbnail

Resecurity Released a 2024 Cyber Threat Landscape Forecast

Security Affairs

Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 100 and government agencies worldwide, has compiled a comprehensive forecast outlining the imminent threats and novel security challenges anticipated in the upcoming year. Cybersecurity company Resecurity has published the 2024 Cyber Threat Landscape Forecast.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

And yet we are overlooking profound privacy and security ramifications. billion IoT devices in use as of 2017, half are consumer gadgets, like smart TVs, speakers, watches, baby cams and home thermostats; much of the rest is made up of things like smart electric meters and security cameras in corporate and government use.

IoT 189
article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

Critically, the utility had in place an internal compliance program at the time of the violations. The Settlement Agreement is heavily redacted in places, including redactions of the utility’s name, so as not to disclose sensitive information about the utility’s cyber defenses and/or in any way compromise the bulk power system.

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise. That’s no coincidence because the tenets of records management are encompassed within IG (along with legal, privacy, risk/compliance, security, technology, etc.). 3 … 2 … 1 ….

article thumbnail

Tiao Discusses Utilities’ Concerns in Sharing Information with the Government

Hunton Privacy

Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. View the Platts Energy Week feature with Paul Tiao. In the feature, “U.S. The leak of the memo has undermined that trust.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

That pace is unlikely to slow down over the coming years; Pagely noted that organizations are still turning to IoT devices as a way to automate and optimize their business processes as well as save on energy costs. A prime example of this is what California is doing with the California Consumer Privacy Act. IoT Protection is Key.

IoT 122