FERC Proposes Policies and Rules to Address Extreme Weather Conditions
Blogs

FERC Proposes Policies and Rules to Address Extreme Weather Conditions

FERC initiated two notices of proposed rulemakings (NOPRs), on June 16, 2022, focused on improving the reliability of the bulk power system against the chall...
Biden Administration Launches $630 Million to Modernize Nation’s Hydropower Fleet: Public Feedback Requested
Blogs

Biden Administration Launches $630 Million to Modernize Nation’s Hydropower Fleet: Public Feedback Requested

President Biden’s Bipartisan Infrastructure Law invests in two main programs to modernize the nation’s hydropower facilities and to produce clean and afforda...
The Offshore Wind Industry needs more than just Political Commitment to Grow Dramatically
Blogs

The Offshore Wind Industry needs more than just Political Commitment to Grow Dramatically

The global energy crisis has increased the ambition of governments around the world to improve energy security, net-zero and affordability, however there are...
Kaspersky Uncovers Fileless Malware Inside Windows Event Logs
Blogs

Kaspersky Uncovers Fileless Malware Inside Windows Event Logs

The cybersecurity and anti-virus provider, Kaspersky has discovered an unprecedented, targeted malware campaign that uses a unique technique to hide fileless malware inside the Windows event logs.
NIST Publishes Review of Digital Forensic Methods
Blogs

NIST Publishes Review of Digital Forensic Methods

NIST publishes the draft report of the Scientific Foundation Review undertaken to test the reliability and scientific basis of the digital forensic methods used to gather digital evidence.
Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure
Blogs

Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure

The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom are releasing this joint Cybersecurity Advisory (C...
FERC Cleaner, Easier-to-use eLibrary
Blogs

FERC Cleaner, Easier-to-use eLibrary

FERC maintains "eLibrary" as the document repository for important regulatory documents such as filings, orders, and so on. Being familiar with this resour...
ERCOT/PUCT Electric Service Emergency Operations Plans Due April 15, 2022
Blogs

ERCOT/PUCT Electric Service Emergency Operations Plans Due April 15, 2022

Electric utilities, transmission operators, and power generators in Texas must file Emergency Operations Plans (EOP) with regulators by April 15, 2022, inc...
The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced
Blogs

The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced

The North American Electric Reliability Corporation (NERC) and the Regional Entities are committed to ensuring and promoting consistency across the ERO Ent...
Google Releases Security Updates for Chrome
Blogs

Google Releases Security Updates for Chrome

Google has released Chrome version 99.0.4844.51 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take...
REMINDER: Preparing for Escalating Cyber Threats
Blogs

REMINDER: Preparing for Escalating Cyber Threats

Governments around the world have issued warnings about escalating cyber threats following the invasion of Ukraine by Russia. The Cybersecurity and Infrast...
Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking
Blogs

Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking

Zenly, a social app from Snap that allows users to see the locations of friends and family on a live map, contains a pair of vulnerabilities that could ...
NIST Cybersecurity and Privacy Program
Blogs

NIST Cybersecurity and Privacy Program

Small businesses face the same online threats that larger enterprises confront every day. But when you have 10 or fewer employees – like most small busine...
CISA Lists Free Cybersecurity Services and Tools
Blogs

CISA Lists Free Cybersecurity Services and Tools

CISA has compiled and published a list of free cybersecurity services and tools to help organizations reduce cybersecurity risk and strengthen resiliency...
Ransomware Attackers Have Code to Halt Critical Infrastructure
Blogs

Ransomware Attackers Have Code to Halt Critical Infrastructure

Cyber attackers who hold a victim’s system hostage by encrypting its data until their demands are met may be laying off “big game” in the U.S., but they’ve ...
MS-ISAC Cyber Security Advisory Issued: “Multiple vulnerabilities have been discovered in Microsoft products”
Blogs

MS-ISAC Cyber Security Advisory Issued: “Multiple vulnerabilities have been discovered in Microsoft products”

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the ...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog
Blogs

CISA Adds Eight Known Exploited Vulnerabilities to Catalog

CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vul...
Arbitrary Code Execution Hazard due to Multiple Google Chrome Vulnerabilities
Blogs

Arbitrary Code Execution Hazard due to Multiple Google Chrome Vulnerabilities

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet...
Implement Cybersecurity Measures to Protect Against Potential Critical Threats
Blogs

Implement Cybersecurity Measures to Protect Against Potential Critical Threats

Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety....