FERC to Change How it Receives Financial and Operational Information of Wind, Solar and Other Non-Hydro Renewables
Blogs

FERC to Change How it Receives Financial and Operational Information of Wind, Solar and Other Non-Hydro Renewables

The NOPR proposes four changes to the USofA for public utilities and licensees. The purpose of these reforms is to modernize the USofA and add functional det...
Phishing Attacks and the National Electric Power Grid
Blogs

Phishing Attacks and the National Electric Power Grid

Any component of the grid could be hacked due to phishing or other types of cyberattacks, which could disrupt the electricity supply, and if a nuclear source...
7 Steps to Securing Your Identity Online
Blogs

7 Steps to Securing Your Identity Online

Data exposure and identity theft are increasing as quickly as the internet is advancing, so it is in your best interest to protect your sensitive information online. Here are...
FBI Warns Scammers are Using Deepfakes to Apply for Remote Tech Jobs
Blogs

FBI Warns Scammers are Using Deepfakes to Apply for Remote Tech Jobs

The FBI has released a public service announcement warning employers about scammers using deepfakes to apply for remote jobs, through which they are able to...
CEO Accused of Making Millions Through the Sale of Fake Cisco Devices
Blogs

CEO Accused of Making Millions Through the Sale of Fake Cisco Devices

A 38-year-old, Florida-based man, allegedly known as Onur ‘Ron’ Aksoy and Dave Durden, was arrested and charged for selling fake Cisco devices worth $1 billion.
Kazakhstan’s Road to Clean Energy – Will the Transition from Fossil Fuels Pose a Challenge?
Blogs

Kazakhstan’s Road to Clean Energy – Will the Transition from Fossil Fuels Pose a Challenge?

Kazakhstan is determined to achieve net-zero carbon emissions by 2060, but to achieve this it needs to control its reliance on cheap domestic coal and increa...
FERC Proposes Policies and Rules to Address Extreme Weather Conditions
Blogs

FERC Proposes Policies and Rules to Address Extreme Weather Conditions

FERC initiated two notices of proposed rulemakings (NOPRs), on June 16, 2022, focused on improving the reliability of the bulk power system against the chall...
Biden Administration Launches $630 Million to Modernize Nation’s Hydropower Fleet: Public Feedback Requested
Blogs

Biden Administration Launches $630 Million to Modernize Nation’s Hydropower Fleet: Public Feedback Requested

President Biden’s Bipartisan Infrastructure Law invests in two main programs to modernize the nation’s hydropower facilities and to produce clean and afforda...
The Offshore Wind Industry needs more than just Political Commitment to Grow Dramatically
Blogs

The Offshore Wind Industry needs more than just Political Commitment to Grow Dramatically

The global energy crisis has increased the ambition of governments around the world to improve energy security, net-zero and affordability, however there are...
Kaspersky Uncovers Fileless Malware Inside Windows Event Logs
Blogs

Kaspersky Uncovers Fileless Malware Inside Windows Event Logs

The cybersecurity and anti-virus provider, Kaspersky has discovered an unprecedented, targeted malware campaign that uses a unique technique to hide fileless malware inside the Windows event logs.
NIST Publishes Review of Digital Forensic Methods
Blogs

NIST Publishes Review of Digital Forensic Methods

NIST publishes the draft report of the Scientific Foundation Review undertaken to test the reliability and scientific basis of the digital forensic methods used to gather digital evidence.
Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure
Blogs

Joint Cybersecurity Advisory “a roll-up” of Russian Activity to Impact Infrastructure

The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom are releasing this joint Cybersecurity Advisory (C...
FERC Cleaner, Easier-to-use eLibrary
Blogs

FERC Cleaner, Easier-to-use eLibrary

FERC maintains "eLibrary" as the document repository for important regulatory documents such as filings, orders, and so on. Being familiar with this resour...
ERCOT/PUCT Electric Service Emergency Operations Plans Due April 15, 2022
Blogs

ERCOT/PUCT Electric Service Emergency Operations Plans Due April 15, 2022

Electric utilities, transmission operators, and power generators in Texas must file Emergency Operations Plans (EOP) with regulators by April 15, 2022, inc...
The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced
Blogs

The Expectation for Consistency across Regional Entities: What to do if Inconsistency is Experienced

The North American Electric Reliability Corporation (NERC) and the Regional Entities are committed to ensuring and promoting consistency across the ERO Ent...
Google Releases Security Updates for Chrome
Blogs

Google Releases Security Updates for Chrome

Google has released Chrome version 99.0.4844.51 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take...
REMINDER: Preparing for Escalating Cyber Threats
Blogs

REMINDER: Preparing for Escalating Cyber Threats

Governments around the world have issued warnings about escalating cyber threats following the invasion of Ukraine by Russia. The Cybersecurity and Infrast...
Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking
Blogs

Bugs in the “Snap-owned” tracking app reveal phone numbers and allow account hijacking

Zenly, a social app from Snap that allows users to see the locations of friends and family on a live map, contains a pair of vulnerabilities that could ...
NIST Cybersecurity and Privacy Program
Blogs

NIST Cybersecurity and Privacy Program

Small businesses face the same online threats that larger enterprises confront every day. But when you have 10 or fewer employees – like most small busine...
CISA Lists Free Cybersecurity Services and Tools
Blogs

CISA Lists Free Cybersecurity Services and Tools

CISA has compiled and published a list of free cybersecurity services and tools to help organizations reduce cybersecurity risk and strengthen resiliency...
Ransomware Attackers Have Code to Halt Critical Infrastructure
Blogs

Ransomware Attackers Have Code to Halt Critical Infrastructure

Cyber attackers who hold a victim’s system hostage by encrypting its data until their demands are met may be laying off “big game” in the U.S., but they’ve ...