Cybersecurity
-
IIOT Cyber
Securing Industrial Control Systems: A Holistic Defense-In-Depth Approach
Defense-in-depth is a concept that is already widely deployed by many organizations within their IT infrastructures. However, many organizations do not apply it to their industrial control system (ICS) operations, owing mostly to obscure protocols. But as IT and ICS architectures converge and high-profile cybersecurity incidents mount, a robust, holistic defense-in-depth solution may be […]
-
IIOT Power
The 4M Approach to a Connected Plant
Technology is being incorporated into operations and maintenance schemes at an ever-increasing pace. New digital tools are helping optimize assets, improve performance, and reduce overall costs. Big Data Best
-
IIOT Cyber
Industrial Cybersecurity Is the Next Risk Frontier
The energy industry must work together to restore trust in the digital age. When Hurricane Harvey hit, Houston knew what to do. Emergency response plans went immediately into effect to save lives and jump-start a long recovery. But as energy leaders convene here in the world’s energy capital for CERAWeek, we need to ask […]
-
Instrumentation & Controls
Russian Cyber Threat Actors Have Gained Access to Power Plant ICS Systems
Russian government cyber threat actors have infiltrated workstations and servers of corporate networks containing data output from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems associated with an unnamed number of power plants, the Department of Homeland Security (DHS) has warned. The dire warning issued by the agency’s U.S. Computer Emergency […]
-
IIOT Power
Congratulations to the Connected Plant Game Changers
The Connected Plant Game Changer Award recognizes those people who are leading the charge in implementing digital technologies in their field: either in the chemical process industries or in power generation. Nominations are open to individuals who have used tools associated with digitalization to contribute to innovation, solve a problem or make improvements, as well […]
Tagged in: -
IIOT Power
ICS Cybersecurity Threatened, but Defense Woefully Inadequate
Though increasingly serious cybersecurity threats loom, nearly two-thirds of U.S. industrial control system (ICS) vulnerabilities identified in 2017 could cause severe operational impact if exploited, cybersecurity firm Dragos Inc. warned in a series of reports published March 1. The reports, which cover ICS vulnerabilities, ICS threats, and reactions to existing threats, draw a dire picture […]
-
Press Releases
Radiflow and Wireless Data Systems Partner to Protect Critical Infrastructure
MAHWAH, NJ and WILMINGTON, NC (February 27, 2018) – Radiflow, a provider of cybersecurity solutions for critical infrastructure, and Wireless Data Systems, a nationwide provider of turnkey wireless-based networks for multiple applications including broadband, surveillance, monitoring, private network extensions and more, today announced that the two companies have entered into a value added reseller agreement. Wireless […]
-
IIOT Power
Intrusion-Tolerant SCADA Demonstrated at Power Plant
Researchers have successfully demonstrated an open-source supervisory control and data acquisition (SCADA) system designed to withstand attacks and compromises on the power grid. The intrusion-tolerant system—called “Spire”—keeps power flowing even if part of the system is compromised, and it may be a breakthrough for grid resiliency, industry observers said. Spire was built from the ground […]
Tagged in: -
IIOT Power
Cybersecurity Tips for Power Plant Operators [PODCAST]
Cybersecurity threats have increased dramatically as sophisticated, nation-state developed hacking programs have been leaked to the general public. Now, common criminals have high-tech tools at their disposal with the capability to cause serious damage. As such, the power industry must take precautions and upgrade security to keep systems safe. While regulations provide a minimum security […]
Tagged in: -
Legal & Regulatory
DOE Establishes Office Dedicated to Cybersecurity, Energy Security, Emergency Response
A newly established U.S. Department of Energy (DOE) office dedicated to cybersecurity, energy security, and emergency response may be a signal that it is elevating its focus on emerging grid threats. The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) will use $96 million in funding included in President Trump’s Fiscal Year 2019 budget […]
Tagged in: