cybersecurity

refinery-109023_960_720

Is a Major Oil and Gas Hack Just a Matter of Time?

With hackers hacking everything from the presidential campaign to online stores to my own Facebook account (on a regular basis, it seems), it’s just a matter of time before the oil industry gets hit in a big way.  And the results could be

winter-681175_960_720

Oil & Gas Pipeline Security

Theft from pipelines and leaks are costly for both pipeline operators and the environment. According to Havocscope Black Market, theft from pipelines amounts to about $37.23 billion globally a year[i]  and in the US nearly 9 million gallons

hacker-2300772_960_720

Cybersecurity Act in Singapore set to improve security culture across Asian utilities

Singapore’s upcoming Cybersecurity Act is expected to heighten levels of cyber risk awareness among water, power and oil & gas utilities in Singapore and in other parts of Asia, according to a Black & Veatch security expert. “As w

power-plant-2259713_960_720

Digital Transformation Part II: Security in Industrial Power

Today, the business of industrial power involves more boarders, more access points, and more outside suppliers with outside approaches than ever before. There’s a lot for cyber security executives in this sector to think about. Even pri

hacker-1952027_1920

Ransomware: Are industrial environments leaving Pandora’s Box wide open?

Ransomware is a rising threat and its severity is only set to grow. In 2016, ransomware attacks increased by almost 17,000 per cent from the year before, with 15 per cent seeking to hold data to ransom in the mechanical and industrial sectors

cybersecurity

How can we best protect the modern power grid?

The digitization of the power sector has resulted in a vibrant ecosystem that spans from exploration to distribution. Made of the sum of its parts, this system carries vast amounts of data round the clock, fed by IT enabled devices monitoring

The Defense Threat Reduction Agency and United States Strategic Command Center for Combating Weapons of Mass Destruction have selected CH2M to lead efforts in West Africa to broaden its Cooperative Biological Engagement Program on the African continent and reduce the threat of infectious diseases. (PRNewsFoto/CH2M)

Defense Threat Reduction Agency and U.S. Strategic Command select CH2M for $35M biosafety and biosecurity contract

The Defense Threat Reduction Agency and United States Strategic Command Center for Combating Weapons of Mass Destruction (DTRA/SCC-WMD) have selected CH2M to lead efforts in West Africa to broaden its Cooperative Biological Engagement Program

cyber_security

New Cyberbit Range Release Offers Hyper-Realistic Training for Multidimensional Approach to Cyberdefense

Cyberbit, whose cybersecurity solutions protect the world’s most sensitive systems, today announced the expansion of its Cyberbit Range security training and simulation platform, offering dynamic, hands-on training for IT security teams

Opening the wrong attachment can easily introduce malware to your computer system, according to a recent study by Dell.

Ransomware: One wrong click for utilities and all your files are encrypted by hackers

The scourge of ransomware – malware that hijacks your PC and encrypts all of its files – has become so ingrained in the very fabric of computing, some of the criminals behind it have actually begun offering live chat support for victims.

metso

Metso’s upgraded PlantTriage software simplifies real-time performance management and strengthens cybersecurity

Metso Expertune PlantTriage(TM), a control loop monitoring system, oversees process control loops night and day, diagnoses and prioritizes opportunities for improvements, and pinpoints major economic paybacks. As a tool of the digital world,