cybersecurity

Student Wins Cyber Challenge With App to Test Cybersecurity Knowledge

Article

Booz Allen recently teamed up with the Student Veterans of America (SVA) and Portfolium to host its first-ever online cyber challenge and are thrilled to name the winner—Alison Wood, a student at Carthage College.

Data and Partnerships Serve as the Foundation for Tomorrow’s Smarter Cities

Article

The insights uncovered in Black & Veatch’s 2018 Strategic Directions: Smart Cities & Utilities Report demonstrate a growing awareness among communities and utilities that modern, digital infrastructure such as data collection networks, infrastructure automation and advanced communication systems are the key components of today’s smart city initiatives. It is only through these systems that cities and utilities can optimize operations to realize the promise of the smart city – and create a sustainable future.

Funding, Preparation and Culture Keys to Securing Critical Infrastructure and Systems

Article

In Washington, D.C., the Trump administration’s focus on infrastructure investment has gained growing attention in the energy sector and intensified dialogue about how these assets are protected from both cyber and physical attack. To get a better sense of the risk environment, the administration issued an executive order in May mandating an assessment of the country’s resilience against cyber attacks.

For Power Industry, Innovation Is Key

Embracing technology will be critical as the electric industry evolves for the future
Multimedia with summary

For Power Industry, Innovation is Key

For electric utilities, innovation will be key to helping the industry evolve and prepare for the future. View expert insights on on aging infrastructure, the influx of renewable energy, managing security risk and more from the 2017 Strategic Directions: Electric Industry Report.

Booz Allen, SVA and Portfolium Host Cyber Challenge to Help Veterans in College Set Themselves Apart

Blog

While veterans’ military work experience and passion for service to our country can set them apart from traditional university students in the job market, veterans currently enrolled in higher education can also find it challenging to translate their military experience into workforce-relevant skills.

Incorporating Inclusive Growth

Blog

Companies that think beyond the bottom line may be stronger and more innovative, a report on the private sector’s role in inclusive growth argues.

HPE Labs VIDEO | How a Ground-up Approach Can Keep Data Safe

Blog

At 11:08 a.m. on August 15, 2012, every security professional’s nightmare came true for Saudi Aramco, the world’s largest oil company. A piece of malware known as W32.Disttrack, or, more familiarly, Shamoon, crippled more than 35,000 of its PCs and servers, replacing the files they stored with an image of a burning American flag.

Shamoon was engineered to spread undetected through a network, infect as many computers as possible, and, upon command, overwrite their master boot records, destroying the computers’ information and leaving them incapable of being restarted.

Prioritizing Cybersecurity Key to Ensure Safe, Secure Utilities

Electric utilities are making progress with cybersecurity, but gaps remain
Article

Facing inevitable attacks to their networks by hackers, electric utilities are making progress in prioritizing cybersecurity to ensure that they can deliver and maintain safe, secure utilities for all. However, this year’s Strategic Directions: Electric Industry Report shows even as leaders work to ensure grid security, major gaps remain in the areas of asset security control and security risk awareness.

Technology Creates New Efficiencies, But Are Water Utilities Prepared for the Security Risk?

Article

Yahoo!, the Democratic National Convention and the U.S. Department of Justice were among the high-profile victims hit by major cyber attacks in 2016. Many people believe it’s only a matter of time before a water utility joins the list. Some consider physical security to be the weak link in ensuring a well-protected water supply; while others worry that the Internet of Things has created an incalculable number of entry points for hackers to create mischief.

Pages

Subscribe to cybersecurity