BUSINESS > Production > Energy


« Back to News

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

2018-07-05

Can Russian Hackers Be Stopped?

Few companies can survive a sustained assault by hackers, even fewer are prepared to defend against state-backed attacks. Is there a deterrent?

2018-06-26

German Nuclear Plant Infected With Viruses

The RWE Gundremmingen nuclear plant, located northwest of Munich, has been found to be infected with computer viruses. But don't worry....

2018-06-15

Deaths From Cyber Attacks

Attacks that cause physical harm to systems that involve critical infrastructure are an emerging challenge and the consequences could be fatal.

2018-04-17

The US Power Grid Needs Better Security

Most Americans think the US government is not doing enough to protect the electric grid from cyber attacks.Their fears appear to be justified.

2018-03-19

US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its critical infrastructure.

2018-02-19

Bitcoin Energy Use In Iceland Soars

Making Money: Electricity use at Bitcoin mining data centres located in Iceland is likely to exceed the energy consumption of all the nation's homes.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-08-14

The US Power Generation System Is Under Siege

A remote substation working through a control system not connected via the Internet has less security than a power plant & is often an entry point.

Directory of Suppliers

IBM

IBM

IBM manufactures computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

IT Governance Ltd

IT Governance Ltd

IT Governance is a leading provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001, GDPR and cyber security.

Certification Magazine

Certification Magazine

Certification Magazine is an IT technical training and certification publication

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Cetus Solutions

Cetus Solutions

Cetus Solutions offerings include Network Security, Mobile Workspaces, Business Continuity & Disaster Recovery.

Radisys

Radisys

Radisys develops high performance software and systems for the telecomms industry, including SDN/NFV and cloud architectures, LTE networks, and IMS service delivery.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Paysafe Group

Paysafe Group

Paysafe delivers a full suite of payments solutions. From payment gateways to digital wallets, merchant accounts and fraud and risk compliance.

SISA

SISA

SISA is a payment security specialist providing payment security assurance services, training and products to over 1,000 customers across the globe.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

N-Stalker

N-Stalker

N-Stalker is a leader on Web Application Security Assessment technology.

Phantom Cyber

Phantom Cyber

Phantom is a leader in security automation & orchestration. Phantom’s open and extensible architecture helps you work smarter, respond faster, and strengthen your defenses.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.