Topic: Data

How to Build a Cybersecurity Compliance Plan

Cybersecurity compliance can seem overwhelming at first. There is a multitude of standards, tools, and resources on the market to help organizations through the process. How do I find legitimate vendors? If any vendor tells you that using their tool guarantees compliance with a given regime, consider them suspect. When you speak with a vendor, ask them to ...


3 Steps to Infrastructure Security and Resiliency

November is Critical Infrastructure Security and Resilience Month. In this blog post, we’ll look into what security and resiliency really mean for critical infrastructures such as the energy sector, water monitoring systems, and emergency services. ...


Reliable Water Quality Monitoring with Integrated Conductivity Sensors in Water Treatment Systems

On-line conductivity measurement of mineral contamination in water allows reliable and inexpensive monitoring of water quality through the various stages of treatment. In comparison to having to install different analog sensors to cover the total measuring range, a single digital conductivity sensor with integrated measuring circuit can measure from ultrapure to brackish water. ...


Albert: The Smart Networking Monitoring Solution for Utilities

Most network monitoring solutions are now offering next-generation threat detection methods that use machine learning to reduce false positives and detect anomaly network traffic. Albert is a passive IDS offered by CIS as a low cost and very effective network monitoring service for which threat detection is based on threat signatures. ...


Optimizing Alarm Management in Power Plants

Automated alarm systems have been standard in power plants for decades. Their driving philosophy is to provide operators with as much feedback as possible to make informed decisions. But how to validate which of the alarms in the power plant is the most critical one and needs the intermediate actions to be taken? Check it now! ...


4 Ways Network Monitoring Keeps Utilities Safe

It’s no secret that people are concerned about the security of the U.S. power grid. Cyber criminals are always looking to exploit weaknesses in systems and networks. And unless you’re looking for malicious activity, you may not even know that your networks have been breached. Network monitoring can be used to detect unusual behavior and provide ...


Cybersecurity Strategies the U.S. Power Grid Should Apply

A multifaceted approach to cybersecurity can help power utilities provide defense against similar attacks. ...


All Change – From gas to oil

Large scale projects typically involve many stakeholders, contractors and suppliers, which can lead to increased complexity and more challenging situations. Delivering such projects on time and within budget requires considerable coordination and management skills; traits that one US energy company needed in order to complete its most recent expansion project. ...


Cybersecurity and the U.S. Power Grid

Most of the nation's critical infrastructure is Internet-dependent and is the target of persistent cyber attacks. Learn what organizations can do to increase the security. ...


Power Utilities are Vulnerable to Cyber Attacks Like Spear Phishing

Find out what spear phishing is and how it can leave power utilities at risk. ...


26 Results Found