quantum computing
-
Connected Plant
A Blueprint for Quantum-Safe Utility Communications
Managing risk is nothing new to utilities. Providing the safe utility services like electricity, water, sewer, and wastewater management that everyone relies upon is hard work. Critical infrastructure assets are prime targets for bad actors looking to use cyberattacks to cause high-impact disruptions. As utilities adopt software-centric, data-driven operations, they will continue to work diligently […]
-
Commentary
Quantum Computing Can Help Utilities Become More Reliable
Below freezing at breakfast, sweltering by supper, dramatic swings in weather are no longer the purview of small talk. Predicting, accounting for, and reacting to weather are boardroom agenda items that impact
-
Trends
Digitalization Is Now a Power Sector Imperative: Takeaways from Connected Plant Conference 2023
Digitalization is now so firmly embedded in the power sector that if participants haven’t yet begun their digital journey, they’ve inherently fallen behind. That was a message repeated at the three-day 7th annual Connected Plant Conference (CPC), which took place this week in New Orleans, Louisiana. POWER magazine and Chemical Engineering magazine’s conference this year […]
-
IIOT Power
A New Frontier: Quantum Computing in the Power Sector
Digitalization, driven by big data, the industrial internet of things (IIOT), and even artificial intelligence (AI), has made its mark on the power industry, allowing for greater transparency into operations
-
IIOT Power
DOE Lays Out How Power Sector Could Win the Cybersecurity Battle
Cybersecurity threats are outpacing the energy sector’s “best defenses,” and costs of preventing and responding to cyber incidents are straining company efforts to protect critical infrastructure, the Department of Energy (DOE) warned as it released a comprehensive five-year cybersecurity strategy for the industry. The Multiyear Plan for Energy Sector Cybersecurity, dated March 2018 but which […]
Tagged in:- Ukraine grid attack
- cybersecurity costs
- forensics
- CRISP
- information sharing
- quantum computing
- GPS time signals
- cybersecurity
- grid-edge devices
- load management
- EPRI
- OT
- microgrid protection
- technology
- DOE strategy
- C2M2
- ICS-CERT
- cybersecurity blueprint
- NESCOR
- workforce
- guidance
- SDN
- cyber crime
- self-configuring architectures