Topher, an avid Mac user for the past 15 years, has been a contributing author to MacFixIt since the spring of 2008. One of his passions is troubleshooting Mac problems and making the best use of Macs ...
In January, a cyberattack against water utilities in small Texas towns caused water to overflow in the city of Hale Center. “There were 37,000 attempts in four days to log in to our firewall,” Mike ...
Threats against power utilities in the United States have never been as real or diverse as they are today. Combating rising theft, vandalism and cyber assaults in today's economy is a challenge for ...
The threat landscape for utility providers continues to evolve. Utilities are facing new security requirements, and over the years, the tools used for security have risen to the challenge. With recent ...
New threats and security risks are emerging as utilities deploy Internet of Things (IoT) and cloud technologies. Mitigating these risks requires a combination of cybersecurity and physical security, ...
The world is facing a perfect storm of market pressures — from geopolitical to economic to environmental concerns. Because of this, uncertainty is impacting businesses and government agencies ...
Do utilities and energy companies spend huge amounts for physical security but slight information-technology security? That’s what’s suggested in the results of a survey of 291 information technology ...
Suppose the Wright brothers, before their first airplane flight at Kitty Hawk, North Carolina on Dec. 17, 1903, had been able to assemble a band of suppliers interested in aviation. Things would have ...
Building a utility's reputation may take years, but it can be damaged or destroyed very quickly from a security event. Reputational risk is regarded as the greatest threat to a company's market value ...