![Mitigating Insider Threats: Five Strategies for Critical Infrastructure Entities this Cybersecurity Awareness Month](https://www.powermag.com/wp-content/uploads/2017/08/fig-2_cybersecurity.jpg)
A New York Times Magazine expose detailed the complicated and shockingly brazen inner workings of international espionage. However, the spies profiled weren’t targeting government secrets. They were interested in corporate…
A New York Times Magazine expose detailed the complicated and shockingly brazen inner workings of international espionage. However, the spies profiled weren’t targeting government secrets. They were interested in corporate…
The energy sector recorded three times as many operational technology (OT) and/or industrial control system (ICS) cybersecurity incidents as the next closest vertical, according to a study conducted by the…
Supervisory control and data acquisition (SCADA) is crucial to contemporary power systems and is widely used in industry and defense. SCADA are computer-based systems that are used to centrally control,…
Although the utility industry is the backbone of any economy, it lags in adopting the latest technologies. This is evidenced by the fact that utilities are underperforming in customer satisfaction…
We are currently witnessing the most dizzying pace of technological innovation in our lifetimes, if not ever. Our lives are becoming increasingly more digital, cutting out archaic and inefficient processes…
Along with technology and process, this year’s Connected Plant Conference (CPC) spotlights the people driving digitalization, the holistic transformation of business models and operations into a more connected, data-driven, versatile, and…
Digitalization is now so firmly embedded in the power sector that if participants haven’t yet begun their digital journey, they’ve inherently fallen behind. That was a message repeated at the…
Siemens Energy and Schneider Electric, two industrial control system (ICS) vendors for critical infrastructure industries, have been reportedly listed as ransomware victims by cybercrime gang CL0P, though any targeted attacks…
It’s been two years since the historic Colonial Pipeline ransomware attack shut down one of the largest and most vital oil pipelines in the U.S. While this hasn’t been the…
A tailored approach to evaluating and implementing benefit-based cybersecurity technologies for wind power plants. Recent research and development (R&D) have provided insights into cybersecurity strategies and business cases for cybersecurity…