Ontario Energy Board Cyber Security Framework Compliance

The Ontario Energy Board recently published a report entitled “Cybersecurity Framework to Protect Access to Electronic Operating Devices and Business Information Systems within Ontario’s Non-Bulk Power Assets.

Spotlight

New Context

New Context is an innovator in the security of data for highly regulated industries including energy, telecommunications, finance and retail. We provide consulting services and build tools that help our customers around the globe prepare for security orchestration, building critical infrastructure that works with emerging tech. Drawing on our years of experience working with clients in the enterprise and industrial internet, New Context is developing tools that integrate security into software development holistically. Our Lean Security Intelligence Platform (LS/IQ) is a new approach to cybersecurity for the enterprise - creating a strategic roadmap optimizing development resources for security, speed and regulatory compliance. Contact us to learn if LS/IQ is available for your organization.

OTHER WHITEPAPERS
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

DeltaV™ Mobile Security Manual

whitePaper | October 26, 2022

DeltaV™ Mobile provides read-only access to process data and alarms on mobile devices. The solution includes a combination of software and hardware integrated with your existing network

Read More

Spotlight

New Context

New Context is an innovator in the security of data for highly regulated industries including energy, telecommunications, finance and retail. We provide consulting services and build tools that help our customers around the globe prepare for security orchestration, building critical infrastructure that works with emerging tech. Drawing on our years of experience working with clients in the enterprise and industrial internet, New Context is developing tools that integrate security into software development holistically. Our Lean Security Intelligence Platform (LS/IQ) is a new approach to cybersecurity for the enterprise - creating a strategic roadmap optimizing development resources for security, speed and regulatory compliance. Contact us to learn if LS/IQ is available for your organization.

Events