PRC-019-2 is being revised
Blogs

PRC-019-2 is being revised

PRC-019-2 addresses the reliability issue of miscoordination between generator capability, control systems, and protection functions. However, PRC-019-2 was...
MOD-025-2 is being revised
Blogs

MOD-025-2 is being revised

MOD-025-2’s purpose is to ensure that accurate information on generator gross and net Real and Reactive Power capability and synchronous condenser Reactive P...
Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure
Blogs

Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure

The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom are releasing this joint Cybersecurity Advisory (C...
FERC’s Cleaner, Easier-to-use eLibrary
Blogs

FERC’s Cleaner, Easier-to-use eLibrary

FERC maintains "eLibrary" as the document repository for important regulatory documents such as filings, orders, and so on. Being familiar with this resour...
ERCOT/Public Utility Commission of Texas (PUCT) Electric Service Emergency Operations Plans Due April 15, 2022
Blogs

ERCOT/Public Utility Commission of Texas (PUCT) Electric Service Emergency Operations Plans Due April 15, 2022

Electric utilities, transmission operators, and power generators in Texas must file Emergency Operations Plans (EOP) with regulators by April 15, 2022, inc...
The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced
Blogs

The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced

The North American Electric Reliability Corporation (NERC) and the Regional Entities are committed to ensuring and promoting consistency across the ERO Ent...
Google Releases Security Updates for Chrome
Blogs

Google Releases Security Updates for Chrome

Google has released Chrome version 99.0.4844.51 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take...
REMINDER: Preparing for Escalating Cyber Threats
Blogs

REMINDER: Preparing for Escalating Cyber Threats

Governments around the world have issued warnings about escalating cyber threats following the invasion of Ukraine by Russia. The Cybersecurity and Infrast...
Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking
Blogs

Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking

Zenly, a social app from Snap that allows users to see the locations of friends and family on a live map, contains a pair of vulnerabilities that could ...
NIST Cybersecurity and Privacy Program
Blogs

NIST Cybersecurity and Privacy Program

Small businesses face the same online threats that larger enterprises confront every day. But when you have 10 or fewer employees – like most small busine...
CISA Lists Free Cybersecurity Services and Tools
Blogs

CISA Lists Free Cybersecurity Services and Tools

CISA has compiled and published a list of free cybersecurity services and tools to help organizations reduce cybersecurity risk and strengthen resiliency...
Ransomware Attackers Have Code to Halt Critical Infrastructure
Blogs

Ransomware Attackers Have Code to Halt Critical Infrastructure

Cyber attackers who hold a victim’s system hostage by encrypting its data until their demands are met may be laying off “big game” in the U.S., but they’ve ...
MS-ISAC Cyber Security Advisory Issued: “Multiple vulnerabilities have been discovered in Microsoft products”
Blogs

MS-ISAC Cyber Security Advisory Issued: “Multiple vulnerabilities have been discovered in Microsoft products”

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the ...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog
Blogs

CISA Adds Eight Known Exploited Vulnerabilities to Catalog

CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vul...
Arbitrary Code Execution Hazard due to Multiple Google Chrome Vulnerabilities
Blogs

Arbitrary Code Execution Hazard due to Multiple Google Chrome Vulnerabilities

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet...
Implement Cybersecurity Measures to Protect Against Potential Critical Threats
Blogs

Implement Cybersecurity Measures to Protect Against Potential Critical Threats

Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety....