In August 2014, NERC published its Cyber Security Reliability Standards CIP V5 Transition Guidance. The deadline to comply with NERC CIP 5, as it’s called, was scheduled for April 1, 2016. Many U.S.
Any discussion around security and how much is good enough for utilities is framed by standards, how well those standards are implemented, and risk. In the U.S., the security of the electric utility ...
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric ...
FERC initiated this proceeding with a Notice of Proposed Rulemaking (the "NOPR") in early 2022.[4] In the NOPR, FERC raised the issue of a regulatory gap in Critical Infrastructure Protection ("CIP") ...
HOUSTON , Oct. 13 /PRNewswire/ -- As the next NERC CIP compliance deadlines grow near, power utilities are homing in on solutions. Bow Networks' president, Jeff Gill , and GarrettCom's EVP, John Shaw ...
The critical role of data centers in sustaining global economic health and societal function has been widely acknowledged and ...
Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
RuggedCom introduced a new NERC (North American Electric Reliability Council) CIP (Critical Infrastructure Protection) Cyber Security solution at the 2007 DistribuTECH show in San Diego. RuggedCom ...
The electric power industry is a relatively exposed component of the nation’s infrastructure. Vulnerabilities to natural disasters, system disruptions and human ...
There are no unimportant North American Electric Reliability Corporation (NERC) reliability standards, but from time to time, NERC and the Regional Entities (Regions) place greater emphasis on certain ...
Last week I described real life SCADA vulnerabilities. My intent was to assist IT security people to dialogue with their executive management about security budgets. This week I will continue by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results