Cybersecurity
The report on data from the Cybernews Business Digital Index also revealed that only 10% of top oil and gas firms passed a basic cybersecurity assessment. The rest failed.
The Cybersecurity and Infrastructure Security Agency said in a recent alert that cyberattackers are going after industrial control systems and supervisory control and data acquisition systems.
The rapid development of oil and gas intelligent operations depends on artificial intelligence, automation, and data analytics to achieve optimal conditions in oil and gas operations.
-
The TRITON/TRISIS/HatMan malware incident proved that the worlds of process safety and industrial control systems should be looked at holistically, not just from the standpoint of potential cyberthreats.
-
Most businesses understand that data is essential to improving operational performance and that data technologies provide opportunities for more-accurate risk assessment and control of safety-critical systems. Nonetheless, statistics show that the threat of cybercrime is growing.
-
Texas Sen. John Cornyn introduced legislation that would extend authority over the cybersecurity of oil and natural gas pipelines, as well as liquefied natural gas facilities, to the secretary of energy.
-
Saudi Aramco and Raytheon signed a memorandum of understanding to establish a joint venture that will develop and provide cybersecurity services in Saudi Arabia and the region.
-
A hack on Italian oil services firm Saipem that crippled more than 300 of the company’s computers used a variant of the notorious Shamoon virus, Saipem said, a development that links the case to a massive attack in 2012 on Saudi Aramco.
-
The Italian oil-services company is still assessing the scope and impact of a cyberattack that targeted its servers in the Middle East, according to the company’s head of digital and innovation.
-
The greater connectivity of the digital age and the Internet of Things has resulted in increased efficiency through big data, analytics, sensors, and the ability to automate highly sensitive tasks. However, it has also opened the doors to cyberattacks.
-
Research has found that most cyberattacks against the energy and utilities industry transpire and thrive inside enterprise information-technology networks rather than critical infrastructure.
-
Cyberattacks are often seen as an IT issue, but the intelligence gained during the development of an effective cybersecurity protocol may serve a broader role as a business driver for energy. What should companies look for in assessing threats?
-
Cybersecurity means understanding systems, processes, and personnel capabilities and limitations, as well as thoroughly evaluating the threat landscape.