Our blogs Blogs home
Energy in Transition

Energy in Transition

Solving the energy trilemma

General
Follow DNV GL on social media

The Threat of Cybercrime

I recently read an article that stated “During the next five years, cybercrime might become the greatest threat to every person, place and thing in the world.” This got me thinking, is this a “Chicken Little” statement or a call to action for ...

Read more
How Blockchain and Cryptocurrency boost Internet of Electricity

How Blockchain and Cryptocurrency boost Internet of Electricity

The vision of an internet of electricity (read my previous article) is becoming a lot more real with the growing understanding and adoption of blockchain and cryptocurrency. Just to set the scene: “In my mind we will move towards a ...

Read more

UK to become world leader in battery technology – here’s how we can help you on this exciting journey!

We find the recent announcement by the Business Secretary to establish the United Kingdom as a world leader in battery technology highly encouraging! By launching the “Faraday Challenge,” the UK government will as part of its Industry Strategy in ...

Read more

Industroyer and Industrial Control Systems

One June 14th the news of a new Cyber Threat made the news and set the Internet a buzz with warnings of gloom and doom.  The name of this new threat is Industroyer or Crash Override.  Funny piece of trivia here, in the movie Hackers that came out i ...

Read more

8 ways to manage a security crisis

There are any number of things that could happen to your business, a ransomware attack, server crash or a legacy system stops working, or a software release goes totally wrong. These are just some of the problems that your company could experience at ...

Read more
Considerations for Demand Response Programs in the Middle East and Africa

Considerations for Demand Response Programs in the Middle East and Africa

Definition A Demand Response (DR) program is a set of organized activities to induce customers to modify, temporarily, the time pattern of energy use in response to signals from the System Operators (SO). Essentially, the SO aims to shift the peak ...

Read more
2016: the ascent of sustainable-kind

2016: the ascent of sustainable-kind

Cheap renewable energy part of a process which started 10,000 years ago. People who live through times of tumultuous change usually don't realise it. Most people most of the time are not hammering chunks out of the Berlin Wall or detonating atom b ...

Read more

Seven steps of threat intelligence

Cybersecurity can be a herculean task at times. Every day, Internet connected companies and organizations endure malicious cyber-attacks from people all around the world. As part of your cybersecurity efforts, you must not only catch the invaders whe ...

Read more

SF6 replacements: switching how we think about power transmission

The effort to replace this potent greenhouse gas in switchgear could also open the door to a new reliable, cost-effective and greener option for electricity transmission. In a post last year, I discussed how the T&D industry can combine economic ...

Read more

Cisco Critical Warning

During a recent WikiLeaks dump of CIA cyber-vulnerability exploits a vulnerability in Cisco’s IOS software that was disclosed and it has resulted in the company releasing a critical warning to its Catalyst customers. The vulnerability allows an ...

Read more