Cybersecurity
-
IIOT Power
Alarming Increase in Cybersecurity Threats Prompts Spate of Government Action
Lawmakers, industry, and government entities, including the Department of Energy (DOE) and the National Institute of Standards and Technology (NIST), this week released a string of measures responding to mounting cybersecurity attacks by state-sponsored actors. A Revised Cybersecurity Framework On April 16, the Commerce Department’s NIST, a federal standards laboratory, released an updated version of […]
-
IIOT Power
Russian Cyber Actors Preying on Network Devices, Authorities Warn
Russian state-sponsored cyber actors are exploiting routers and other network infrastructure devices worldwide to conduct man-in-the-middle attacks that specifically target critical infrastructure providers and other sectors, the U.S. Department of Homeland Security (DHS), the FBI, and the UK’s National Cyber Security Centre (NCSC) warned in a new joint technical alert. In the U.S. Computer Emergency […]
-
IIOT Cyber
Securing Industrial Control Systems: A Holistic Defense-In-Depth Approach
Defense-in-depth is a concept that is already widely deployed by many organizations within their IT infrastructures. However, many organizations do not apply it to their industrial control system (ICS) operations, owing mostly to obscure protocols. But as IT and ICS architectures converge and high-profile cybersecurity incidents mount, a robust, holistic defense-in-depth solution may be […]
-
IIOT Power
The 4M Approach to a Connected Plant
Technology is being incorporated into operations and maintenance schemes at an ever-increasing pace. New digital tools are helping optimize assets, improve performance, and reduce overall costs. Big Data Best
-
IIOT Cyber
Industrial Cybersecurity Is the Next Risk Frontier
The energy industry must work together to restore trust in the digital age. When Hurricane Harvey hit, Houston knew what to do. Emergency response plans went immediately into effect to save lives and jump-start a long recovery. But as energy leaders convene here in the world’s energy capital for CERAWeek, we need to ask […]
-
Instrumentation & Controls
Russian Cyber Threat Actors Have Gained Access to Power Plant ICS Systems
Russian government cyber threat actors have infiltrated workstations and servers of corporate networks containing data output from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems associated with an unnamed number of power plants, the Department of Homeland Security (DHS) has warned. The dire warning issued by the agency’s U.S. Computer Emergency […]
-
IIOT Power
Congratulations to the Connected Plant Game Changers
The Connected Plant Game Changer Award recognizes those people who are leading the charge in implementing digital technologies in their field: either in the chemical process industries or in power generation. Nominations are open to individuals who have used tools associated with digitalization to contribute to innovation, solve a problem or make improvements, as well […]
-
IIOT Power
ICS Cybersecurity Threatened, but Defense Woefully Inadequate
Though increasingly serious cybersecurity threats loom, nearly two-thirds of U.S. industrial control system (ICS) vulnerabilities identified in 2017 could cause severe operational impact if exploited, cybersecurity firm Dragos Inc. warned in a series of reports published March 1. The reports, which cover ICS vulnerabilities, ICS threats, and reactions to existing threats, draw a dire picture […]
-
Press Releases
Radiflow and Wireless Data Systems Partner to Protect Critical Infrastructure
MAHWAH, NJ and WILMINGTON, NC (February 27, 2018) – Radiflow, a provider of cybersecurity solutions for critical infrastructure, and Wireless Data Systems, a nationwide provider of turnkey wireless-based networks for multiple applications including broadband, surveillance, monitoring, private network extensions and more, today announced that the two companies have entered into a value added reseller agreement. Wireless […]
-
IIOT Power
Intrusion-Tolerant SCADA Demonstrated at Power Plant
Researchers have successfully demonstrated an open-source supervisory control and data acquisition (SCADA) system designed to withstand attacks and compromises on the power grid. The intrusion-tolerant system—called “Spire”—keeps power flowing even if part of the system is compromised, and it may be a breakthrough for grid resiliency, industry observers said. Spire was built from the ground […]
-
IIOT Power
Cybersecurity Tips for Power Plant Operators [PODCAST]
Cybersecurity threats have increased dramatically as sophisticated, nation-state developed hacking programs have been leaked to the general public. Now, common criminals have high-tech tools at their disposal with the capability to cause serious damage. As such, the power industry must take precautions and upgrade security to keep systems safe. While regulations provide a minimum security […]
-
Legal & Regulatory
DOE Establishes Office Dedicated to Cybersecurity, Energy Security, Emergency Response
A newly established U.S. Department of Energy (DOE) office dedicated to cybersecurity, energy security, and emergency response may be a signal that it is elevating its focus on emerging grid threats. The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) will use $96 million in funding included in President Trump’s Fiscal Year 2019 budget […]
-
IIOT Power
Using Artificial Intelligence to Protect the U.S. Power Grid
The North American Electric Reliability Corp. (NERC) standard on physical security—known as Critical Infrastructure Protection-014 (CIP-014)—includes six basic requirements, but perhaps the most
-
IIOT Power
Exercise Proves Hacking a Threat to Nuclear Power Plants
Cybersecurity is a topic covered frequently in the pages of POWER magazine, and one that all power plants need to take seriously. A recent simulation proved that the consequences of a hack can be grave. The drill took place in Sweden, but could have been conducted anywhere in the world. The attack used plant control […]
-
Press Releases
Custom Industrial Computing Leader Introduces Products to Support Energy Industry
FoxGuard Solutions and Security Matters partner to provide a new cyber secure industrial computing solution to the energy industry. CHRISTIANSBURG, Va. (January 18, 2018) — FoxGuard Solutions, Inc. announced the release of GRID-FS1, a new fanless rugged industrial computer for substation application. Designed to meet IEC 61850-3 and certified for IEEE 1613, the GRID-FS1 is […]
-
Legal & Regulatory
FERC Proposes Mandatory Reporting of Attempted Cybersecurity Compromises
The Federal Energy Regulatory Commission (FERC) has proposed a revision of the Critical Infrastructure Protection (CIP) Reliability Standards to enhance awareness of existing or developing cybersecurity threats to the nation’s energy infrastructure. FERC issued a Notice of Proposed Rulemaking (NOPR) on December 21 that directs the North American Electric Reliability Corp. (NERC) to broaden CIP-008-5 […]
-
IIOT Power
Overcoming IIoT, Edge Networking Challenges
As power plants and substations become more connected, the need for rugged networking equipment built to withstand tough conditions is amplified. The military has already gone through the growing pains, so
-
Legal & Regulatory
A Bird’s-Eye View: Drones in the Power Sector
Unmanned aerial systems—drones—have quickly found their place in the power sector. But as the industry moves out of test cases and experiments, and into full implementation of drones, it is facing a whole
-
Connected Plant
Utilities Prepare for Simulated Attack on U.S. Power Grid
Utilities across the country are gearing up for an attack on the power grid November 15 and 16. Thankfully, it’s only a drill. But in the event of an actual emergency, a real physical and cyberattack on the U.S. electricity infrastructure, GridEx IV—a biennial exercise conducted by the North American Electric Reliability Corp. (NERC)—will help […]
-
Commentary
Why CrashOverride Is a Red Flag for U.S. Power Companies
Organizations across every industry today face a wide range of cyber threats and serious security challenges from various vectors. A top concern among these is the persistence cybersecurity experts are seeing
-
IIOT Power
General Best Cybersecurity Practices to Thwart a Dragonfly Attack
A report released by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) outlines a number of solutions and general best practices to thwart infiltration by the ongoing Dragonfly cyberattack campaign, which it says is targeting operational technology personnel. (For an in-depth story on that report, see: “DHS, FBI Identify Tactics in Cyberattack […]
-
IIOT Power
DHS, FBI Identify Tactics in Cyberattack Campaign Targeting Industrial Control Systems
The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned in an e-mail on October 20 that an ongoing cyberattack campaign is targeting the nuclear, energy, and other critical infrastructure sectors since at least May 2017—with results ranging from cyber espionage to the ability to disrupt energy systems in the event of […]
-
Gas
Tackling NERC CIP and Cybersecurity at America’s Largest Gas-fired Cogeneration Plant
The Midland Cogeneration Venture (MCV) in Midland, Michigan, is the largest natural gas-fired combined electrical energy and steam energy generating plant in the U.S. It is capable of continuously producing
-
IIOT Cyber
Cyberattack Campaign Is Aimed at Disrupting Energy Sector Operations, Security Firm Warns
A group has launched a new wave of cyberattacks aimed at severely disrupting operations in the European and North American energy sectors, IT security firm Symantec warns. Dragonfly, a group that has been in operation since at least 2011, has re-emerged over the past two years, the firm said in an official blog posting on […]
-
Renewables
Could Success Spoil ISO-NE?
Independent System Operator-New England celebrated its 20th anniversary last July with a solid record in its energy and capacity markets, turning around a fragmented regional electric system. Can it repeat
-
O&M
Stepping Up Cybersecurity: Power Producers Move Ahead
The energy sector has been hit with almost one-third of the cyberattacks against U.S. industrial facilities in recent years. It is among the top issues, along with reliability, environmental regulations, and
-
Connected Plant
The Smart Grid’s Missing Ingredients
The same technology that links our phones to other smart devices is the key to unlocking a more intelligent, efficient, and reliable electrical grid. Every day, we bear witness to the breathtaking pace of technological advancement in the modern world. Yet when we go home and turn on the light, the bulb is illuminated in […]
-
O&M
Energy Generation from A-to-Z with Machine Learning
The human brain is an amazing thing, but it has limitations. However, with the advent of machine learning, the limitations of the human brain no longer have to be the limitations of civilization. Machine
-
Connected Plant
Malware in Modern ICS: Understanding Impact While Avoiding Hype
Understanding the threat posed to industrial control systems (ICSs) by malware is difficult. It requires knowledge of proper ICS functionality in order to identify illegitimate software. One industrial
-
Connected Plant
The Future Is Now: Connected Power Plants Are Here
New technology is being used throughout the power industry to improve plant efficiency, predict trouble with degrading equipment, forecast weather trends, and train workers. A recent conference hosted by POWER