article thumbnail

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)

CGI

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). From a cybersecurity perspective, DERs pose new and unique challenges for utilities. Mon, 06/17/2019 - 05:09.

article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

Critically, the utility had in place an internal compliance program at the time of the violations. The Settlement Agreement is heavily redacted in places, including redactions of the utility’s name, so as not to disclose sensitive information about the utility’s cyber defenses and/or in any way compromise the bulk power system.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How utilities are getting creative to find new revenue streams

CGI

How utilities are getting creative to find new revenue streams. The utilities industry is undergoing a paradigm shift. This year’s findings reveal that 57% of our utility clients view increasing investments in new products and services as key to addressing regulatory reforms. harini.kottees…. Mon, 10/15/2018 - 06:42.

article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Russia has twice now knocked out Ukraine’s power grid for extended periods, in the Industroyer attacks of December 2015 and again in December 2016. Issued a few days after the killing, the report assesses cyber risks of North American electrical utilities, identifying 11 hacking groups that target energy sector companies.

article thumbnail

A new piece of Snake Ransomware targets ICS processes

Security Affairs

It is for these same reasons that some RaaS (Ransomware as a Service) offerings utilize the language as well. One such example would be Project Root. “ The Snake ransomware targets files associated with SCADA platforms, enterprise management tools, and system utilities. Pierluigi Paganini.

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. Significantly, version 1.1 NIST’s fact sheet on the updated version is available here: [link].

article thumbnail

Russia Sanctions May Spark Escalating Cyber Conflict

Krebs on Security

The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure. State-backed Russian hackers have been blamed for the Dec. and European nations.