|

IT


Two Keys for Better Critical Infrastructure Cybersecurity

Two recent incidents have made the cost of not protecting our infrastructure and natural resources abundantly clear. First, there was the widely publicized SolarWinds attack that infected more than a…


5 Cybersecurity Best Practices to Protect Your OT Systems
cybersecurity

Over the last several years, cyber actors and online criminal gangs have used cyber warfare to disrupt business and infrastructure across the globe. Today, they are becoming even more aggressive…


How to Monitor Assets Remotely Today

As long as products have had ethernet ports, people have been asking for remote access to them. They believed they could just plug the devices into the internet, and it…


The Energy-Sector Threat: How to Address Cybersecurity Vulnerabilities
cybersecurity

Electric-power and gas companies are especially vulnerable to cyberattacks, but a structured approach that applies communication, organizational, and process frameworks can significantly reduce cyber-related risks. In our experience working with…


Digital Transformation: Lessons from a Leader
Power-plant-Digital

Is your company’s information technology (IT) department your friend or your enemy? Does it work with you to identify, evaluate, and select the best new digital technology to make your…