• Home
  • About
    • About
    • Articles
    • Interviews
    • Other activities
    • Awards
  • Keynotes
  • Books
  • Giving back
    • United Nations
    • Sponsorships
    • Litter-picking initiative
    • Virtual travel
    • Zero-day advisories
  • Contact

Articles

Cybersecurity
Sustainability

Cybersecurity

Key considerations and solutions to ensure cyber resiliency in the smart integrated energy systems

The document contains an overview of the subject, identifies, and categorizes the types of cyberattacks on the exposed energy system components and their possible consequences, and concludes with a set of managerial- and technical-level measures and policy recommendations to mitigate the cybersecurity risks

Read article

4 Types of Cyber-Attacks on the Smart Grid That Can Endanger Energy Security

The document contains an overview of the subject, identifies, and categorizes the types of cyberattacks on the exposed energy system components and their possible consequences, and concludes with a set of managerial- and technical-level measures and policy recommendations to mitigate the cybersecurity risks

Read article

Data storage and destruction. Here's how it works

Data storage on computers, phones, even smart home devices. They all have a hard drive, also known as a hard disk, to store data. It's so obvious that we probably don't think about it, just as we hardly think about what our brains store in everyday life. But however inconspicuous it may be, we can't do without it. And, good news, removing information from a hard drive is much easier than from our memory. This article explains how this works.

Read article (Dutch)

A social engineering test - How does that work? | Introduction into the methodology of a penetration test, part 7

Previous articles have already looked at the methodology for 1) web application, 2) perimeter, 3) hardware, 4) mobile app, 5) WLAN, and 6) local network testing. As the conclusion to the series “Introduction to the methodology of a penetration test,” this article provides an insight into the “social engineering” testing method.

Read article (German)

An internal network test - How does that work? | Introduction into the methodology of a penetration test, part 6

Previous articles have already looked at the methodology for 1) web application, 2) perimeter, 3) hardware, 4) mobile app, and 5) Wi-Fi testing. This article now provides an introduction to performing an internal network test.

Read article (German)

A wifi test - How does that work? | Introduction into the methodology of a penetration test, part 5

Previous articles have already looked at the methodology for 1) web application, 2) perimeter, 3) hardware, and 4) mobile app testing. This article provides an introduction to performing a Wi-Fi test.

Read article (German)

A mobile test - How does that work? | Introduction into the methodology of a penetration test, part 4

Previous articles have already looked at the methodology for 1) web application, 2) perimeter, and 3) hardware testing. This article now offers an introduction to the analysis of a mobile app.

Read article (German)

A hardware test - How does that work? | Introduction into the methodology of a penetration test, part 3

Since SySS Newsletter 3/2015, we have been regularly discussing the “Introduction to the Methodology of a Penetration Test” in this blog. Starting with the procedure for web application testing, this was followed in December 2016 by a description of how to perform a perimeter test. This article continues the series and focuses on hardware analysis.

Read article (German)

The invisible

The main goal of a penetration test is to uncover vulnerabilities. Analyzing the visible attack surface plays a crucial role in this process. If we compare a digital attacker to a burglar, we could say that even a thief needs to be able to see the front door of a house in order to pick the lock. But “the visible” is often only the tip of the iceberg in IT security. This article explains why.

Read article (German)

Where is the S in IoT? About IT-security in the Internet of Things

IT security has reached a new dimension in the field of IoT. More and more poorly secured or completely unsecured Internet-enabled devices are becoming accessible worldwide—an open door for attackers. Developers of IoT products should therefore familiarize themselves with existing measures that can be used to mitigate potential risks.

Read article (German)

A perimeter test - How does that work? | Introduction into the methodology of a penetration test, part 2

During a TCP port scan, packets are sent to the server, which the scanner uses to identify whether the port is open, closed, or filtered, providing information which services are available. This article explains how a perimeter test works

Read article (German)

A web application test - How does that work? | Introduction into the methodology of a penetration test

To give customers and those interested in IT security an insight into the procedure for a security analysis, the following section describes how a web application test is carried out.

Read article (German)

Sustainability

The nexus of artificial intelligence and energy security; Strategic opportunities for U.S.-India leadership

Energy security, affordability, and resilience are central to national energy discussions in the United States. As artificial intelligence scales rapidly across the economy, its implications for electricity demand, grid reliability, and system costs are becoming increasingly clear. At the same time, AI presents a powerful opportunity to strengthen how energy systems are planned, operated, and secured.

Read article

> 180 science communication articles about nature and sustainability

Sharing fascinating facts about nature and sustainability; science communication. 

Read articles

Behavioural barriers in adoption of smart meters

The transition from fossil fuels to renewable energy such as solar and wind, aimed at mitigating environmental issues, is taking place globally and takes time. There are various reasons why the clean energy transition takes time; one of these are psychological barriers, which are discussed in this paper.

 

Read article

Key considerations and solutions to ensure cyber resiliency in the smart integrated energy systems

The document contains an overview of the subject, identifies, and categorizes the types of cyberattacks on the exposed energy system components and their possible consequences, and concludes with a set of managerial- and technical-level measures and policy recommendations to mitigate the cybersecurity risks.

Read article

Addressing Behavioural Barriers to Energy Digitalization

The Task Force on Digitalization in Energy developed the present document that takes into account psychological aspects and focuses on energy behaviour (actions that affect the way energy is utilized to achieve desired services) and its interlinkages with digitalization, energy efficiency, and broader energy system transformation. It identifies and assesses seven barriers and suggests ways to overcome them.

Read article

15 tips om de wereld beter te maken

15 tips to make the world a better place

Read article (Dutch)

Improving Efficiency of Buildings through Digitalization – Policy Recommendations from the Task Force on Digitalization in Energy

This evidence-based document, developed by the Task Force on Digitalization in Energy, elaborates on the role that application of digital technologies could play to increase energy efficiency in buildings. It aims to raise awareness of policymakers and stakeholders of related benefits, risks, uncertainties, and trade-offs, and contains key recommendations for further consideration by the Group of Experts on Energy Efficiency and the Committee on Sustainable Energy.

Read article

Saving Money AND Living Environmentally Friendly?

Can you imagine that SAVING MONEY and LIVING SUSTAINABLY go together? It does! And Dr. Erlijn van Genuchten proves it to you. Because: she didn’t just go through it theoretically, she tested everything in her own life – for well over a year.

Read article

5 Ways to reduce water consumption

What are some effective ways to reduce water consumption? In this article, we look at 5 simple ways to do just that.

Read article

5 Ways To Reduce Your Energy Consumption

What are some effective ways to reduce your energy consumption at home? In this article, we will give you some ideas on how to do just that on a daily basis.

Read article

Top Tips From the 365 Sustainable Decisions Challenge

Erlijn van Genuchten, Ph.D. is doing a 365 Sustainable Decisions Challenge since August 2019, which involves making another sustainable decision every day over the course of a year. Here is the top 15 from August until March:

Read article

5 Simple Ways to Reduce Food Waste

How to reduce food waste? In this article, we are going to look at five simple ideas that will help to reduce it.

Read article

5 Actions That Anyone Can Take to Clean the Environment

What are some simple actions that anyone can take to clean the environment? In this article, we look at five of them.

Read article

How to feel better in any crisis

The current circumstances with having to deal with two crises at once – the Corona and climate crisis – puts a lot of tension on many of us. Most experience it as a very unpleasant situation. This article explains what you can do to feel better.

Read article

5 Ideas to be more sustainable while driving your car

What steps can you take to make your daily life more sustainable? In this article, we have a look at what you could do while driving your car.

Read article

Try the 365 Sustainability Challenge

The news on climate change with related challenges and consequences seems to explode at present, as there are many things that require special attention: greenhouse gas emissions, micro plastics, extinction of species and many more. This is why Erlijn van Genuchten started doing a 365 Sustainable Decisions Challenge, aiming at making her daily life more sustainable, one decision at a time.

Read article

One small decision a day keeps the disaster away

The news on climate change with related challenges and consequences seems to explode at present, as there are many things that require special attention: greenhouse gas emissions, micro plastics, extinction of species and many more. So, of course, this news also reached me. Although I have always been conscious about our environment, the concerning news makes me very eager to act. And as I don’t like pointing fingers and wait for others to go first, I caught inspiration by a Dutch saying: “a better world starts with yourself”.

Read article
Home Privacy Terms and Conditions Imprint

Copyright © 2025 Sustainable Decisions All rights reserved.

{:lang_general_banner_cookie_disclaimer}
{:lang_general_banner_cookie_cookie} {:lang_general_banner_kartra_cookie}
{:lang_general_banner_cookie_privacy}
{:lang_general_powered_by} KARTRA