Blog Posts Tagged with "Smart Grid"
ICS-SCADA Security Concerns Spur Increased Funding
December 12, 2011 Added by:Headlines
“Many SCADA systems were deployed without security in the belief that SCADA would always be isolated from the Internet. But it’s not, and even when it is, attacks such as Stuxnet can circumvent the isolation by using USB memory sticks to spread..."
Comments (0)
Smart Grid: There Will be a Successful Attack
December 08, 2011 Added by:Headlines
"Interfacing so many different hardware and software components introduces vulnerabilities—especially when new and legacy hardware and software need to operate together... Perfect protection from cyber attacks is not possible. There will be a successful attack at some point..."
Comments (0)
The War Over SCADA - An Insider's Perspective
November 26, 2011 Added by:Rafal Los
Media reports would lead the outside observer to believe that nothing is being done to improve the state of cybersecurity for our critical infrastructure, and this is completely false. A significant amount of effort is being expended in both improving the security of existing systems...
Comments (3)
Utility Cyber Security is in a State of Near Chaos
November 16, 2011 Added by:Headlines
"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."
Comments (0)
IEEE Addresses SCADA Security Standard Challenges
November 08, 2011 Added by:Headlines
"As the rate of bolder, more sophisticated cyber attacks continues to spiral upward, ensuring data integrity and security has become increasingly challenging. By necessity, preventing unauthorized intrusion into critical systems has become a top priority..."
Comments (0)
NIST Updates Smart Grid Framework Standards
November 08, 2011 Added by:Headlines
"Making such dramatic changes to the power grid requires an overarching vision of how to accomplish the task, and this updated Framework advances that vision. Utilities, manufacturers, equipment testers and regulators will find essential information... that was not previously available..."
Comments (0)
Security Investment to Focus on Utility Control Systems
October 18, 2011 Added by:Headlines
“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."
Comments (0)
U.S. - E.U. Collaborate on Smart Grid Standards
September 14, 2011 Added by:Headlines
"The potential benefits of Smart Grids are enormous, they can only be fully reached if we can all agree on global solutions. It is promising to see that NIST and SG-CG will be supporting common positions and areas of collaboration to ensure a consistent set of international standards..."
Comments (0)
Just How Important is Cyberspace Defense?
May 11, 2011 Added by:Robert Siciliano
Critical infrastructures all depend on the electric grid. After a major attack, we’d be back to the dark ages in an instant. No electricity, no computers, no gasoline, no refrigeration, no clean water. Think about what happens when the power goes out for a few hours. We’re stymied...
Comments (0)
Smart Grid in the Old Dominion
April 27, 2011 Added by:Mike Meikle
How will infosec be impacted by the push toward Smart Grid technologies? Information security skills encompassing everything from applications to hardware will be in great demand. The collected data needs to be securely protected when utilized by the consumer and provider...
Comments (0)
Oklahoma State House Passes Smart Grid Privacy Bill
March 31, 2011 Added by:David Navetta
The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...
Comments (0)
Next Generation Power Grid Security
March 22, 2011 Added by:Ben Rothke
With the benefits of AMI come security and privacy issues, and those open the metering infrastructure to thieves, stalkers, and a range of other threats. AMI also opens up a new set of privacy issues in that the AMI devices will be collecting significant amounts of personal energy data...
Comments (0)
Do You Know About Heavyweight NERC CIP 011-1?
March 13, 2011 Added by:Ron Lepofsky
Electrical utilities are already challenged with the process of becoming certified for compliance with the NERC CIP standard for IT security. The NERC CIP standard is evolving, thank goodness. Perhaps you haven’t noticed the innocuous sounding proposed new standard now in the creation process...
Comments (2)
What’s the Threat? Smart Grid or Dazed Defenders
February 21, 2011 Added by:Ron Lepofsky
NERC CIP standards are written expressly for electrical utilities. If rigorously deployed they are a material step towards security. A more comprehensive set of security control within COBIT, upon which IT SOX compliance is based, should be considered for hardening the electrical grid...
Comments (0)
Department of Energy Takes on Smart Grid Security
February 19, 2011 Added by:David Navetta
The core team has invited stakeholders from across the utility sector to participate in the initiative, including representatives from the Federal Energy Regulatory Commission, the Department of Homeland Security, and both publicly and privately-owned utilities...
Comments (1)
Electric Cars, Identities and Peak Saver Programs
November 30, 2010 Added by:Guy Huntington
Cars in the future will have their own “utility identity”. This will be done via the use of a digital certificate. When a electric car pulls up to a charging station, the utility will be able to query the car’s computer system and receive the digital certificate identifying the car and owner...
Comments (1)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider