Cybersecurity
For more than a century, LSU has shaped petroleum engineering education, but few assets showcase its impact like the PERTT Lab. With six deep test wells and rare reservoir-depth gas-injection capabilities, the facility is helping drive breakthroughs in well control, carbon-dioxide injection, and next-generation energy technologies.
This study presents a novel hybrid approach to enhance fraud detection in scanned financial documents.
AI is transforming the field of cybersecurity, offering new possibilities and challenges for both defenders and attackers, but AI also can introduce new vulnerabilities and risks and raise new ethical, legal, and social issues for cybersecurity.
-
Five years ago, an attack on nearly two dozen US natural gas utilities set off alarm bells in the US intelligence community. Many gas companies say they have shored up security since then. But the sector’s overall cyber readiness is a black box even to those charged with overseeing it.
-
In recent months, more US oil company boards have demanded information technology managers prove refineries and drilling rigs are protected against cyberattacks, the chief of a security firm says.
-
A cybersecurity director outlines the steps needed to adopt a risk-based cybersecurity program. He cautions that in many cases, process control systems’ confidentiality is mistakenly viewed as a lower priority than IT systems’.
-
Honeypots and pen testers. If these terms are unfamiliar, you’ll want to learn their roles in the safekeeping of critical evaluation and operational data in oil and gas activities, from the reservoir to the well pad to pipelines.
-
Atos, a global leader in digital services, and Siemens, a global engineering leader, announced that they have entered into a memorandum of understanding and will leverage their portfolios to help customers establish an integrated first line of defense against cyberattacks.
-
Industry CIOs examine the challenges operators and service companies face in understanding cybersecurity threats.
-
Changes coming to the anonymity tools underlying the darknet may make a deeper kind of online privacy possible. Soon anyone will be able to create their own corner of the Internet that’s not just anonymous and untraceable, but entirely undiscoverable without an invite.
-
Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore.
-
Hackers have gotten smarter and bolder in their recent attempts to steal coveted oil company data. Mario Chiock has worked for years to keep them at bay.
-
Cyber threats have expanded beyond data breaches and the theft of intellectual property. Drilling and production assets are at risk of being disrupted or destroyed due to vulnerable control systems.