The Benefits of Remote Monitoring for Transformers and Other Electrical Equipment

Credit to Author: Aaron Larson| Date: Fri, 01 Dec 2023 05:11:15 +0000

digital-technology-connected-plant

Obtaining real-time operating data on power plant and substation equipment has never been easier. The sensors, transmitters, and systems needed to monitor important parameters are readily available and highly

The post The Benefits of Remote Monitoring for Transformers and Other Electrical Equipment appeared first on POWER Magazine.

Read more

Digitalisation and Cyber Resilience: Why the Energy and Utilities Sector Is a Top Target for Cybercrime

Credit to Author: Fabien Rech| Date: Wed, 20 Jul 2022 14:30:14 +0000

cybersecurity

The energy and utilities sector is not just the lifeblood of the world’s economy, but fundamental to society’s existence as a whole. Yet, recent events have highlighted just how volatile and unpredictable it can be. Output is influenced by everything from weather patterns to war, and no business, consumer, or household is immune from the […]

The post Digitalisation and Cyber Resilience: Why the Energy and Utilities Sector Is a Top Target for Cybercrime appeared first on POWER Magazine.

Read more

The ‘Weakest Link’ in Supply Chain Security

Credit to Author: Sonal Patel| Date: Tue, 22 Feb 2022 20:20:24 +0000

The energy transition will bring with it a new generation of cybersecurity challenges for the power sector. While information-sharing has been valuable, strategies to address issues related to vendor security, cyber talent, and lagging investment will also be critical, a former utility supply chain executive who led the development of an industry-wide cybersecurity risk exchange […]

The post The ‘Weakest Link’ in Supply Chain Security appeared first on POWER Magazine.

Read more

Cyber risk management from A to Z: What you need to know

Credit to Author: THIRD LIBREA| Date: Tue, 18 Feb 2020 16:17:54 +0000

Second of two parts M is for Malware. Malware—malicious software—is designed to do damage. Cyber criminals create malware to exploit the vulnerability, to gain access to your systems, hold your data to ransom, or steal it. They may impersonate a well-known brand to deliver it via email, convincing you to click on a link or […]

Read more