BUSINESS > Production > Energy


« Back to News

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

2021-05-14

Pipeline Hack: Biden Issues An Executive Order

This Order will change the way businesses communicate with government about cybersecurity and compels IT providers to share information.

2021-05-11

Running Out Of Cyber Gas

US business is simply not prepared to deal with advanced nation state hackers and the US government is failing to protect it. By Ronald Marks

2021-04-01

New Cyber Security Measures To Protect US Energy

The US is launching new research programs to to safeguard the national energy system from the growing threat of cyber and physical hazards.

2020-07-28

Critical Infrastructure And Cyber Security

Cyber security is top priority for both power system operators and governments. Now, Siemens is joining with NATO to improve network defences.

2020-07-20

The Growing Cyber Threat To Renewable Energy

Recent cyber attacks on global renewable energy businesses have underlined the scale and nature of this previously under-reported threat.

2020-06-02

German Critical Infrastructure At Risk Of Russian Hacking

Russian hackers have a special intrusion technique to target the computer  systems used by industrial firms to manage critical infrastructure.

2020-03-31

The EU Power Grid Is Under Attack

The organisation responsible for coordinating EU electricity markets has disclosed its IT network has been compromised in a “cyber intrusion.”

2020-02-12

Saudi Aramco Under Repeated Attack

The giant oil business is experiencing a sharp increase in cyber attacks, includng the powerful Emotet malware, which it has foiled so far.

2020-01-24

Electric Grids Targeted For Cyber Attacks

Some of the world's most dangerous hackers have zeroed in on the US power sector and the risk of a destructive attack is going up.

2019-11-25

N Korean Hackers Are Targeting India

N Korean hackers identified with with wide-ranging financial theft are now being linked to attacks on India's nuclear power and space programs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Infocyte

Infocyte

Infocyte's unique, agentless threat hunting platform for Windows and Linux is designed to rapidly assess network endpoints for evidence of compromise.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Verve Industrial Protection

Verve Industrial Protection

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Cryptovision

Cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

ThreatBlockr

ThreatBlockr

ThreatBlockr (previously Bandura Cyber) is the only active defense cybersecurity platform that fully automates the enforcement, deployment and analysis of cyber intelligence at a massive scale.