The POWER Interview: How Unified Endpoint Management Can Help Secure the Power Grid

Credit to Author: Aaron Larson| Date: Tue, 10 Sep 2024 00:13:14 +0000

Digital technology poses critical challenges for the power sector. As the backbone of modern society, any disruption to power infrastructure can have far-reaching consequences. To learn steps leading power companies […]

The post The POWER Interview: How Unified Endpoint Management Can Help Secure the Power Grid appeared first on POWER Magazine.

The power sector’s relentless pursuit of an increasingly connected power paradigm amid an escalating cyber threat landscape demands an urgent, multifaceted strategy for cybersecurity. Recently, the sector has embarked on innovative methods to tackle inherent challenges in its evolving quest for a robust cybersecurity posture. Source: POWER

Read more

3 Major Cybersecurity Challenges Facing Critical Infrastructure and OT

Credit to Author: Christina Hoefer| Date: Thu, 08 Aug 2024 15:27:05 +0000

Let’s be honest. Operational technology (OT) security issues are expected. Traditional OT systems were designed for specific functional—operational—purposes. Plus, they were designed to last for many decades. The power grid, […]

The post 3 Major Cybersecurity Challenges Facing Critical Infrastructure and OT appeared first on POWER Magazine.

The power sector’s relentless pursuit of an increasingly connected power paradigm amid an escalating cyber threat landscape demands an urgent, multifaceted strategy for cybersecurity. Recently, the sector has embarked on innovative methods to tackle inherent challenges in its evolving quest for a robust cybersecurity posture. Source: POWER

Read more

Modifying Behavior to Protect Systems in a Malicious Threat Landscape

Credit to Author: Aaron Larson| Date: Wed, 01 May 2019 04:00:40 +0000

The malicious threat landscape for industrial control systems (ICSs) is constantly evolving and getting more sophisticated, thereby raising the need to have visibility, implement protective controls, and perform continuous monitoring. As a result, it is important to take a look at the attack vectors of some malware/malicious events—such as Triton—that have occurred over the last […]

The post Modifying Behavior to Protect Systems in a Malicious Threat Landscape appeared first on POWER Magazine.

Read more