article thumbnail

Protecting the energy sector’s industrial IoT

Security Boulevard

By Steve Hanna, Co-chair of TCG’s Industrial Work Group and IoT Work Group Many sectors now utilize Internet of Things (IoT) equipment to drive digital transformation, and ultimately increase automation and efficiency. The post Protecting the energy sector’s industrial IoT appeared first on Trusted Computing Group.

IoT 117
article thumbnail

C3.ai Digital Transformation Institute Announces AI for Energy and Climate Security Grantees

CyberSecurity Insiders

ai Digital Transformation Institute ( C3.ai ai DTI awards, focused on using artificial intelligence (AI) techniques and digital transformation to advance energy efficiency and lead the way to a lower-carbon, higher-efficiency economy that will ensure energy and climate security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

From taking a shower, to brewing your coffee, and watching the news, your morning routine is fueled by the energy sector. If you’re like millions of other Americans, your TV is connected to the Internet and uses technology generated from the nation’s power grid. The Rising Threat. It also makes me fear that few are.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Most of our current online privacy protocols utilize cryptography to maintain privacy and data integrity. Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. What is quantum computing? What are the security risks? Wrapping up.

Risk 134
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. GLIBC keeps common code in one place, thus making it easier for multiple programs to connect to the company network and to the Internet.

Hacking 176
article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Here are a few key takeaways: The security bottleneck The next great leap forward in digital technologies will give us driverless ground transportation, green cities that continually optimize energy usage and self-improving medical treatments. An intolerable security bottleneck, in fact, is taking shape.

Software 131
article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Industroyer2 was discovered in the network of a Ukrainian energy provider, and it is very unlikely that the attacker would have been able to develop it without access to the same ICS equipment as used by the victim. Some of them were particularly sophisticated.

DDOS 131