December 22, 2024

SolarWinds

Shutterstock
NERC Responds to FERC Cybersecurity NOPRs
NERC and the regional entities expressed support for FERC's cybersecurity proposals but reminded the commission of their already busy development cycle.
Shutterstock
FERC Proposes Further Cybersecurity Measures
FERC issued two NOPRs indicating it will direct NERC to develop new cybersecurity standards.
Shutterstock
NERC Submits INSM Standard for FERC Approval
NERC submitted to FERC its proposed cybersecurity reliability standard requiring utilities to implement internal network security monitoring software on select grid cyber systems.
Shutterstock
NERC Issues Cybersecurity Data Request
Registered entities must report to NERC on the cyber assets present on their systems and the potential impact of adding security monitoring software.
FERC
FERC Orders Internal Cyber Monitoring in Response to SolarWinds Hack
FERC ordered NERC to require utilities to implement internal network security monitoring on certain cyber systems at bulk power system facilities.
NERC
NERC: Grid Transformation Continues to Accelerate
NERC's 2021 Annual Report identified climate change and cybersecurity as major risks to grid reliability, while highlighting efforts to combat them.
Tenable
Report Warns of Growing Cyber Dangers
A new report from cybersecurity firm Tenable warns that critical infrastructure and other sectors must tackle the vulnerabilities found in common platforms.
Shutterstock
Utilities Warned of Cyberattacks amid Russia Tensions
As fears of Russian military action against Ukraine rise, the U.S. government is urging cyber readiness at the nation's critical infrastructure operators.
Shutterstock
FERC Proposes New Cybersecurity Standard
In light of recent cyberattacks, FERC is calling for new standards that would require entities to monitor their internal computer networks for intrusions.
NARUC
NARUC Panelists Push for Software Documentation
Panelists at the National Association of Regulated Utility Commissioners' annual meeting said requiring documentation of software's origins may be tricky.

Want more? Advanced Search