In August 2014, NERC published its Cyber Security Reliability Standards CIP V5 Transition Guidance. The deadline to comply with NERC CIP 5, as it’s called, was scheduled for April 1, 2016. Many U.S.
Userful Corporation, the leading software-defined platform for enterprise-wide operational awareness and response, will showcase its Infinity Platform at DISTRIBUTECH International 2026 (Booth #5300), ...
Any discussion around security and how much is good enough for utilities is framed by standards, how well those standards are implemented, and risk. In the U.S., the security of the electric utility ...
RuggedCom introduced a new NERC (North American Electric Reliability Council) CIP (Critical Infrastructure Protection) Cyber Security solution at the 2007 DistribuTECH show in San Diego. RuggedCom ...
FERC initiated this proceeding with a Notice of Proposed Rulemaking (the "NOPR") in early 2022.[4] In the NOPR, FERC raised the issue of a regulatory gap in Critical Infrastructure Protection ("CIP") ...
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric ...
A growing chorus of experts warns that process sensors — long excluded from cybersecurity standards due to their non-routable protocols — pose a critical risk to the electric grid as FERC and NERC ...
Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
ADDISON, Texas--(BUSINESS WIRE)--N-Dimension Solutions, a market leading Managed Security Service Provider (MSSP) with innovative solutions that protect smart energy networks from cyber threats, ...
The electric power industry is a relatively exposed component of the nation’s infrastructure. Vulnerabilities to natural disasters, system disruptions and human ...
When Washington state utility executive Benjamin Beberness dug into what was behind the crippling cybersecurity blackout in Ukraine, the details were chilling, not only because of their malevolent ...
Last week I described real life SCADA vulnerabilities. My intent was to assist IT security people to dialogue with their executive management about security budgets. This week I will continue by ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果