|

cybersecurity


Mitigating Insider Threats: Five Strategies for Critical Infrastructure Entities this Cybersecurity Awareness Month
cybersecurity

A New York Times Magazine expose detailed the complicated and shockingly brazen inner workings of international espionage. However, the spies profiled weren’t targeting government secrets. They were interested in corporate…


Energy Is the Most-Targeted Sector for Cyberattacks: Here’s What to Do

The energy sector recorded three times as many operational technology (OT) and/or industrial control system (ICS) cybersecurity incidents as the next closest vertical, according to a study conducted by the…


Cyberattack Vulnerabilities of Modern Power Systems

Supervisory control and data acquisition (SCADA) is crucial to contemporary power systems and is widely used in industry and defense. SCADA are computer-based systems that are used to centrally control,…


Automation Imperative in the Utility Industry

Although the utility industry is the backbone of any economy, it lags in adopting the latest technologies. This is evidenced by the fact that utilities are underperforming in customer satisfaction…


Leveraging the Digital Transformation in Solar O&M

We are currently witnessing the most dizzying pace of technological innovation in our lifetimes, if not ever. Our lives are becoming increasingly more digital, cutting out archaic and inefficient processes…