Remove Energy and Utilities Remove Risk Remove Security
article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

CISA JCDC Will Focus on Energy Sector

Security Affairs

This effort began with the 2018 establishment of the Cybersecurity and Infrastructure Security Agency (CISA) , a Department of Homeland Security division. To address this gap, the JCDC is planning proactive measures for future cyber risks. Strengthen operational integration and collaboration with members of the energy sector.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. In May, the Department of Energy confirmed that on March 5, 2019, between 9 a.m. a cyber event disrupted energy grid operations in California, Wyoming, and Utah. and 7 p.m., and 7 p.m.,

article thumbnail

US Officials Urged to Examine Chinese Risk to Electric Grid

Data Breach Today

Utility Vendors Have Cut Back on Buying Chinese Transformers Due to Security Risks Utility companies have increasingly refrained from purchasing large power transformers from China given greater awareness of the security risks.

Risk 233
article thumbnail

Improve safety using root cause analysis and strengthening information management

OpenText Information Management

The energy and resources sector including utilities, oil and gas, chemicals, and metals & mining is one of the most hazardous in the world. Improved safety performance and reduction of risk are just two examples of business outcomes companies strive to improve upon across this sector.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

Is it fair to judge an organization’s information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally exposed data and devices? the security posture of vendor partners). How useful is such a score?

Security 247
article thumbnail

Resecurity Released a 2024 Cyber Threat Landscape Forecast

Security Affairs

Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 100 and government agencies worldwide, has compiled a comprehensive forecast outlining the imminent threats and novel security challenges anticipated in the upcoming year. Recent U.S.