Our blogs Blogs home
Energy in Transition

Energy in Transition

Solving the energy trilemma

cyber security

Posts tagged with 'cyber security'

Follow DNV GL on social media

Separation of duties and IT security

Separation of duties, also known as Segregation of duties, is the concept of having more than one person required to complete a task.  It is a key concept of internal controls and is the most difficult and sometimes the costliest one to achieve. The ...

Read more

What happens, and what should you do, when Ransomware Attacks?

Ransomware has been in the news and on our technological radar for a while now, but for those that have not experienced an attack, very few know what truly happens.  What I would like to do is step through how a ransomware attack progress from start ...

Read more

The Threat of Cybercrime

I recently read an article that stated “During the next five years, cybercrime might become the greatest threat to every person, place and thing in the world.” This got me thinking, is this a “Chicken Little” statement or a call to action for ...

Read more

UK to become world leader in battery technology – here’s how we can help you on this exciting journey!

We find the recent announcement by the Business Secretary to establish the United Kingdom as a world leader in battery technology highly encouraging! By launching the “Faraday Challenge,” the UK government will as part of its Industry Strategy in ...

Read more

Industroyer and Industrial Control Systems

One June 14th the news of a new Cyber Threat made the news and set the Internet a buzz with warnings of gloom and doom.  The name of this new threat is Industroyer or Crash Override.  Funny piece of trivia here, in the movie Hackers that came out i ...

Read more

8 ways to manage a security crisis

There are any number of things that could happen to your business, a ransomware attack, server crash or a legacy system stops working, or a software release goes totally wrong. These are just some of the problems that your company could experience at ...

Read more

Seven steps of threat intelligence

Cybersecurity can be a herculean task at times. Every day, Internet connected companies and organizations endure malicious cyber-attacks from people all around the world. As part of your cybersecurity efforts, you must not only catch the invaders whe ...

Read more

Cisco Critical Warning

During a recent WikiLeaks dump of CIA cyber-vulnerability exploits a vulnerability in Cisco’s IOS software that was disclosed and it has resulted in the company releasing a critical warning to its Catalyst customers. The vulnerability allows an ...

Read more

Cybersecurity and IT Security are NOT the same thing

Cybersecurity isn’t about one threat or one firewall issue on one computer. It's about getting a bigger perspective on what's going on in an IT environment. To keep your company safe from attackers you must look at more than the technical issues ...

Read more
NERC Regulations changes regarding low impact BES facilities

NERC Regulations changes regarding low impact BES facilities

What is a Low Impact BES? A simple definition of a facility rated as Low Impact to the Bulk Electric System Systems (BES) is a system that is not categorized as being High or Medium Impact.  At a high level, the Bulk Electric System is: The ...

Read more