cybersecurity
-
Legal & Regulatory
FERC Proposes Mandatory Reporting of Attempted Cybersecurity Compromises
The Federal Energy Regulatory Commission (FERC) has proposed a revision of the Critical Infrastructure Protection (CIP) Reliability Standards to enhance awareness of existing or developing cybersecurity threats to the nation’s energy infrastructure. FERC issued a Notice of Proposed Rulemaking (NOPR) on December 21 that directs the North American Electric Reliability Corp. (NERC) to broaden CIP-008-5 […]
-
Legal & Regulatory
A Bird’s-Eye View: Drones in the Power Sector
Unmanned aerial systems—drones—have quickly found their place in the power sector. But as the industry moves out of test cases and experiments, and into full implementation of drones, it is facing a whole
Tagged in: -
Connected Plant
Utilities Prepare for Simulated Attack on U.S. Power Grid
Utilities across the country are gearing up for an attack on the power grid November 15 and 16. Thankfully, it’s only a drill. But in the event of an actual emergency, a real physical and cyberattack on the U.S. electricity infrastructure, GridEx IV—a biennial exercise conducted by the North American Electric Reliability Corp. (NERC)—will help […]
Tagged in: -
Commentary
Why CrashOverride Is a Red Flag for U.S. Power Companies
Organizations across every industry today face a wide range of cyber threats and serious security challenges from various vectors. A top concern among these is the persistence cybersecurity experts are seeing
Tagged in: -
IIOT Power
General Best Cybersecurity Practices to Thwart a Dragonfly Attack
A report released by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) outlines a number of solutions and general best practices to thwart infiltration by the ongoing Dragonfly cyberattack campaign, which it says is targeting operational technology personnel. (For an in-depth story on that report, see: “DHS, FBI Identify Tactics in Cyberattack […]
-
IIOT Power
DHS, FBI Identify Tactics in Cyberattack Campaign Targeting Industrial Control Systems
The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned in an e-mail on October 20 that an ongoing cyberattack campaign is targeting the nuclear, energy, and other critical infrastructure sectors since at least May 2017—with results ranging from cyber espionage to the ability to disrupt energy systems in the event of […]
-
Gas
Tackling NERC CIP and Cybersecurity at America’s Largest Gas-fired Cogeneration Plant
The Midland Cogeneration Venture (MCV) in Midland, Michigan, is the largest natural gas-fired combined electrical energy and steam energy generating plant in the U.S. It is capable of continuously producing
-
Press Releases
Siemens and PAS announce global strategic partnership to provide essential industrial control system cybersecurity
Siemens, a global engineering and technology leader, and PAS Global, the leading provider of industrial control system (ICS) cybersecurity solutions, announced an agreement to provide fleet-wide, real time monitoring for control systems. By leveraging the unique capabilities of both companies, this partnership will provide customers with: (1) deep analytics required to identify and inventory proprietary assets; and (2) visibility […]
Tagged in: -
Press Releases
CrowdStrike and Dragos Inc. Partner to Drive Unmatched Cybersecurity Capabilities for Industrial Control Systems
Strategic partnership to augment customers’ ability to stop breaches and proactively detect and mitigate security risks SUNNYVALE, Calif., July 18, 2017 – CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced a joint Services go-to market partnership with Dragos, the renowned Industrial control system (ICS) cybersecurity experts. Today, CrowdStrike Services offers industry-leading cyber readiness assessments, […]
Tagged in: -
Connected Plant
Malware in Modern ICS: Understanding Impact While Avoiding Hype
Understanding the threat posed to industrial control systems (ICSs) by malware is difficult. It requires knowledge of proper ICS functionality in order to identify illegitimate software. One industrial