Skip to main content
×

GE.com has been updated to serve our three go-forward companies.

Please visit these standalone sites for more information

GE Aerospace | GE Vernova | GE HealthCare 

Press Release

Cyber Security: GE GAS Power Authorized as a CVE Numbering Authority (CNA)

May 03, 2022

Greenville, SC – May 3, 2022 - GE Gas Power (NYSE:GE), announced today that it has been authorized by the Common Vulnerability and Exposures (CVE®) Program as a CVE Numbering Authority (CNA). CNAs are organizations responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing.


business unit
tags
header-image
Industrial Internet

Night Watch 2.0: Meet The Digital Ghost In the Machine

Todd Alhart
October 16, 2017
Time was, outages on the power grid were the result of downed tree limbs. Trees and branches are still an issue, but power companies increasingly are worried about hackers and computer viruses. To wit, the ominously named malware Black Energy took out a grid in Ukraine in 2015 and caused 800,000 people to lose power. The threat is only increasing — year over year, cyberattacks on industrial control systems have increased by 55 percent.
header-image
cybersecurity

Privacy Is Not An Option For Surviving In The Digital Age

Paul Stevens Vipole International
September 01, 2017
“The issue of security and privacy is the defining issue of our age,” said Art Coviello, former executive chairman of leading digital security firm RSA, adding, in ominous tones. “Whether we can solve it or not will determine if we are masters of the digital [era] or are its victims.”
header-image
blockchain

The Biggest Tech To Hit Wall Street Since The Internet is Not Yet Ready For Prime Time

Kate Moloney Mit Cisr
Mary Lacity University Of Missouri St Louis Mit Cisr
June 07, 2017
It’s not an overstatement to say that blockchain is one of the most evangelized technologies out there today. Everywhere you look new companies are promising that blockchain will be a game changer for everything from banking to energy to walking.
But is the technology ready for enterprise deployment?
header-image
cybersecurity

If Two Countries Waged Cyber War On Each Other, Here’s What To Expect

Bill Buchanan
December 26, 2016

The scale of cyber attacks on companies are becoming more threatening. What would happen after an assault on a nation's grid? An interconnected world has made us more susceptible to the dangers of a cyber war.

 
header-image
cyber-security

Tom Jacob and Karen Shellenback: A Growing Cyber Vulnerability And The Competition for Talent

Tom Jacob Senior Partner And Global Leader Of Research Insights In The Information Solutions Group Of Mercers Talent Division
Karen Shellenback Principal Mercer Research And Insights
January 28, 2016

As part of a regular series featuring content from BRINK, Tom Jacob and Karen Shellenback of Mercer discuss the need for companies to invest in cybersecurity talent to maintain competitiveness.

 
header-image
cyber-security

David Schwartz: Big Data Demands Big Security

David Schwartz Technology Angel Investor And Startup Consultant
October 11, 2015

Devising strategies to protect Big Data is as important as analyzing the information.

 

Big data is becoming an increasingly important part of the business plan for companies in many different industries. Analyzing large customer datasets and other kinds of data with tools like Hadoop reporting lets companies save money as well as boost revenue by targeting their marketing better, designing products to better appeal to their customers, make better predictions, and so on.
header-image
minds-machines

Video: Gen. Alexander on Keeping the Industrial Internet Safe

October 01, 2015
You may remember four-star General Keith Alexander as the first head of the United States Cyber Command. Now, in the private sector, he’s helping industrial companies protect themselves against hackers. He says that as the number of connected machines and devices grows, so will the potential lines of attack. He sees the vulnerabilities not so much on the enterprise side, but in connected industrial operations – one of fastest growing segments of the Industrial Internet.
header-image
Perspectives

Paul Rogers: Why Cyber Risk Should Be Treated Like an Unlocked Car

Paul Rogers President And Ceo Of Wurldtech
September 30, 2015

Instead of trying to guess the risk of cyber attacks, companies should view their industrial assets like an unlocked car — and simply focus on stopping attacks from occurring in the first place.

 

Part of my job is to evangelize the need for cyber security solutions to protect industrial control systems (ICS). In many instances, when I meet with executives from companies who own or operate industrial technology, they are already aware that their control systems are at risk from cyber attacks.
header-image

Ian Bremmer: 5 Patterns Disrupting the World

Ian Bremmer Eurasia Group
September 23, 2015

Five forces are shaping political risks, from climate change to conflict. Here’s what to look out for.

We see patterns everywhere — in nature, in physics and in the world we’ve created — economic booms and recessions; market spikes and crashes; social stability and revolution. But I’ve never accepted George Santayana when he said, Those who cannot remember the past are condemned to repeat it.” Recognizing patterns is one thing. Thinking they’re repeating themselves, that’s something else entirely.
Subscribe to cyber-security