PORTLAND, OREGON -- November 14, 2013 -- Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the results of a survey on North American ...
On May 23, 2024, FERC approved the North American Electric Reliability Corporation’s (“NERC”) proposed Critical Infrastructure Protection (“CIP”) Reliability Standard, CIP-012-2 (Cyber Security – ...
Any discussion around security and how much is good enough for utilities is framed by standards, how well those standards are implemented, and risk. In the U.S., the security of the electric utility ...
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric ...
As of April 1, 2026, the enforcement of NERC Reliability Standard CIP-003-9 mandates that renewable energy operators ...
CHICAGO & ISSAQUAH, Wash.--(BUSINESS WIRE)--Network Perception, innovators of operational technology (OT) solutions that protect mission-critical assets, and NAES Corporation, the energy industry’s ...
Dragos Platform Fulfills INSM Requirements to Monitor and Protect Critical Electric Infrastructure, Enabling Electric Utilities to Benefit from Early Adoption Incentives HANOVER, Md.--(BUSINESS WIRE)- ...
Grid modernization has created an explosion of network-connected equipment, exposing utilities to a wide range of potential threats from nation states, criminals, disgruntled employees, and accidental ...
Matt Lawrence, senior director of solutions at Doble Engineering Co. Cybersecurity is a top concern for utilities and power companies – the Ukraine grid cyberattack late last year was a wake-up call ...
In August 2014, NERC published its Cyber Security Reliability Standards CIP V5 Transition Guidance. The deadline to comply with NERC CIP 5, as it’s called, was scheduled for April 1, 2016. Many U.S.
Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...