How NERC/CIP compliance is boosting US power grid security

Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Read about the latest […]

Stepping Up Cybersecurity: Power Producers Move Ahead

Read Tim McDonnell’s article about how power producers are investing in cyber security on Power Mag : The cyberattack on Ukraine’s power grid in December 2016 brought the industry’s vulnerabilities into sharp relief. For decades, the more familiar territory of physical security threats had dominated the conversation. Just before Christmas, the grid attack cut power […]

Tackling the cyber security conundrum

Read Marcus Hand’s article about how the merchant navy sector can tackle the cyber security issues facing them on Sea Trade Maritime : A standard bearer for digitalisation in shipping Maersk responded quickly but the company still needed a month to get its systems back fully functioning, highlighting not just the vulnerability of companies in […]

Combining Technology to Combat Cyber Threats

Read  Stephanie Neil’s article about how companies are combining technology to combat cyber threats on Automation World : As cyber threats become more complex, industrial control systems (ICS) are even more vulnerable to attack. To that end, plant floor security can’t be handled the same way as it is in the enterprise where all the […]

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

The North American Electric Reliability Corporation (NERC) serves more than 300 million people in North America as the electric reliability organization under the Federal Energy Regulatory Commission (FERC). In 2013, the FERC approved changes and additions to Critical Infrastructure Protection (CIP) Reliability Standards, also known as CIP v5, which are a set of requirements for […]

Electricity Delivery Is An Open Target For Cyber Threats

Read why Constance Douris says that electricity grids are a open target for cyber threats on National Interest : The electric grid often utilizes industrial control systems to automate generation, transmission and distribution. As utilities adopt digital technologies to keep up with electricity demand and consumption, cyber attack vulnerabilities increase and new entry points emerge. Read […]

Cybersecurity Firms Warn of New Malware Threat to Electric Grids

Two cyber security companies said they have uncovered a sophisticated piece of malicious software capable of causing power outages by ordering industrial computers to shut down electricity transmission. Read about the new malware threats to electric grids as warned by two cyber security companies on Fortune.

Hackers increase attacks on energy sector computers

Reports released this past week by U.S. security officials and private cybersecurity researchers suggest hacking of energy facility computers is on the rise, and happens far more often than the public assumes. Read how the various reports indicate that there are increasing hacking attacks on energy sector computers on Houston Chronicle.

Industrial control systems top threat to UK cyber security

Vulnerabilities in industrial control systems commonly used by suppliers of critical national infrastructure are potentially the biggest threats to UK cyber security, according to a cyber defence expert. Read why Azeem Aleem of RSA says that industrial control systems are a top threat to United Kingdom cyber security on Computer Weekly.

Smart power grid technology may be prone to hacking: study

Smart grid technology – such as management systems in power plants – may be prone to hacking, say scientists who delved into “nightmare” scenarios where hackers exploit security weaknesses and execute a disruptive plan of cyberattacks. Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Read about […]