article thumbnail

Four clever ways smart technology can help create big energy savings

CyberSecurity Insiders

However, Earth Hour goes far beyond the symbolic action of switching off lights – it has become a catalyst to reflect on ways we can create a positive environmental impact by reducing our energy usage and driving major legislative changes by harnessing the power of the people and collective action.

article thumbnail

Ukraine-Russia Conflict: Ukraine Alerts Energy Enterprises to Possible Cyberattack Escalation

Security Boulevard

A statement from the Ukrainian government issued earlier this week warns energy enterprises inside of Ukraine and those of allies worldwide to increase alert for potential cyberattacks related to current Russia-Ukraine war dynamics. (1) 5 ) Attribution has not been publicized. Some cyberattacks are aimed at disruption and data theft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122
article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Critical Success Factors to Widespread Deployment of IoT. Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Threat vectors on IoT.

IoT 96
article thumbnail

Our Principles for IoT Security Labeling

Google Security

Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates around raising the security and transparency bar for IoT products. Proposed Principles for IoT Security Labeling Schemes We believe in five core principles for IoT labeling schemes.

IoT 76
article thumbnail

Why smart meters will be essential to our sustainable future

CyberSecurity Insiders

As highlighted in the recent COP26 conference, human activity is causing unprecedented and potentially irreversible change to our environment, which is being driven by our production of harmful emissions and excessive energy consumption. But smart meters aren’t just saving energy in the homes of consumers.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

The drivers of IoT-centric commerce appear to be unstoppable. Count on the wide deployment of IoT systems to continue at an accelerated rate. There are already more IoT devices than human beings on the planet, according to tech industry research firm Gartner. This time the stakes are too high. Security-by-design lacking.

Internet 189