Cyber immunity for energy infrastructures

January 10, 2019

Energy infrastructures are at serious risk As investments in the renewable energy industry rose rapidly in the last decade, utilities have become a popular target for cyber criminals. In fact, thanks to digitalization and increased interconnectivity, the huge amount of data coming from wind turbines generators (WTGs), SCADA systems and distribution networks is used to make operations run more efficiently, meaning greater benefits in terms of reach, cost-cutting and environmental impact.

Spotlight

Raytheon Pikewerks

Raytheon Company acquired Pikewerks Corporation in December 2011 to further extend Raytheon's capabilities to defend against sophisticated cybersecurity threats facing customers in the intelligence community, Department of Defense and commercial organizations. Pikewerks enhances Raytheon's comprehensive cybersecurity offerings, including a range of analysis and investigation capabilities with particular emphasis on insider threat protection, software protection and forensics. Two high-demand Pikewerks products are Electronic Armor®, an anti-exploitation software tool that protects executable files; and Second Look®, a software capability for live, in-memory forensic analysis of operating systems.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More

Spotlight

Raytheon Pikewerks

Raytheon Company acquired Pikewerks Corporation in December 2011 to further extend Raytheon's capabilities to defend against sophisticated cybersecurity threats facing customers in the intelligence community, Department of Defense and commercial organizations. Pikewerks enhances Raytheon's comprehensive cybersecurity offerings, including a range of analysis and investigation capabilities with particular emphasis on insider threat protection, software protection and forensics. Two high-demand Pikewerks products are Electronic Armor®, an anti-exploitation software tool that protects executable files; and Second Look®, a software capability for live, in-memory forensic analysis of operating systems.

Events