SEO

The key differences between NERC CIP Version 3 and NERC CIP Version 4

The basic difference between the two versions is that NERC CIP Version 4 is much more specific pertaining CIP 002 and the identification of Critical Assets. The result appears to be that control canters, substations, and generation facilities that utilities did not previously declare critical assets will be declared critical assets under version 4. This …

The key differences between NERC CIP Version 3 and NERC CIP Version 4 Read More »

network, networking, web-4636686.jpg

SECURITY ASSESSMENT OF FOREIGN MADE COMPONENTS

Protecting your Cyber Assets Foreign – Cyber Risk One of the biggest sources of cyber risk is foreign-made computer components with digital assets. It makes it easier to launch cyber attacks on U.S. companies and consumers, and this threat is not easy to detect.  For example, the Stuxnet that crippled the Iranian nuclear plant was …

SECURITY ASSESSMENT OF FOREIGN MADE COMPONENTS Read More »

A Gold Standard? Is the Government Capable of Creating Gold Standard for Critical Infrastructure Protection? Really?

NUCLEAR and NERC/CIP CYBER SECURITY COMPLIANCE TOOLS AVAILABLE I read an article in the Washington Post recently about Congress giving the Department of Homeland Security a lot more authority on cyber security protection of critical infrastructure.  The level of urgency and effort shown by the government is legitimate but the question is, does it have …

A Gold Standard? Is the Government Capable of Creating Gold Standard for Critical Infrastructure Protection? Really? Read More »

background, circuit, grey-2426328.jpg

Cyber Security Life-Cycle Management Tool Successfully Installed

I am really glad to report that three of our nuclear power plant CyberWiz-Pro™ licensees are making good progress implementing the tool. They have successfully completed Phase I validation testing, including setting up of their CDA databases, security plans, CSAT teams and more. And, Phase II validation testing is currently going on smoothly.  These STARS …

Cyber Security Life-Cycle Management Tool Successfully Installed Read More »