Power

Welcome to the Power resources page. Here you’ll find a compiled collection of useful information, tools, and resources about industrial cybersecurity for Power including generating, transmitting, nuclear, and all other related aspects.

  • All
  • Blog
  • Books and eBooks
  • Case studies
  • Podcast
  • Video

Securing a European TSO

European TSO Case Study
European TSO Case Study

Securing a European TSO

Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more

How to Prepare for A Cyber Attack on the Grid?

Remember the Y2K bug? That special party you attended with your friends, on December 31st 1999, where the…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

https://youtu.be/srt04xWSdFE Edge network monitoring looks at the lowest level and arguably most important industrial networks, not the networks…
Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

How to Prepare for A Cyber Attack on the Grid?

How to Prepare for A Cyber Attack on the Grid?

Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

Threats to the Grid in North America and Europe

Lately, we've seen important announcements in the news focused on shoring up our power grid against cyber threats.…
Read more

4096 Bits to Hack a Nuclear Reactor

In the first 10 pages of "Anéantir", the latest fictional book by Michel Houellebecq, famed French novelist, he…
Read more

How to Prepare for A Cyber Attack on the Grid?

How to Prepare for A Cyber Attack on the Grid?

Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

Threats to the Grid in North America and Europe

Lately, we've seen important announcements in the news focused on shoring up our power grid against cyber threats.…
Read more

4096 Bits to Hack a Nuclear Reactor

In the first 10 pages of "Anéantir", the latest fictional book by Michel Houellebecq, famed French novelist, he…
Read more

Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook
Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook

Read more
Unidirectional Security for Power Generation eBook - Advanced solutions

Unidirectional Security for Power Generation eBook - Advanced solutions

Generating unit segmentation - compliance benefits through improved securityProtecting the protective relays - a new approach to resilienceProtecting…
Read more
Turbine Monitoring and Diagnostics whitepaper

Turbine Monitoring and Diagnostics eBook

Persistent, targeted attacksAttacks via remote turbine service centersConventional turbine monitoring & diagnostics vs. remote monitoring with  Unidirectional Security…
Read more

Securing a European TSO

European TSO Case Study
European TSO Case Study

Securing a European TSO

Read more
Cybersecurity For Balancing Authorities

Cybersecurity For Balancing Authorities

The Growing Challenge Of Securing The Power Grid
Read more
Securing The Digital Nuclear Generation Perimeter

Securing The Digital Nuclear Generation Perimeter

Cyber Threats To Nuclear Power Generation
Read more
Securing Power Generation At New Brunswick Power

Securing Power Generation At New Brunswick Power

Protecting Reliability And Ensuring Compliance At Power Generation Sites
Read more
Cybersecurity For Hydropower Generation

Cybersecurity For Hydropower Generation

The Growing Hydropower Industry And Facing Modern Cyber Threats
Read more

Securing a European TSO

European TSO Case Study
European TSO Case Study

Securing a European TSO

Read more
Cybersecurity For Balancing Authorities

Cybersecurity For Balancing Authorities

The Growing Challenge Of Securing The Power Grid
Read more
Securing The Digital Nuclear Generation Perimeter

Securing The Digital Nuclear Generation Perimeter

Cyber Threats To Nuclear Power Generation
Read more
Securing Power Generation At New Brunswick Power

Securing Power Generation At New Brunswick Power

Protecting Reliability And Ensuring Compliance At Power Generation Sites
Read more
Cybersecurity For Hydropower Generation

Cybersecurity For Hydropower Generation

The Growing Hydropower Industry And Facing Modern Cyber Threats
Read more

Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook
Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook

Read more
Unidirectional Security for Power Generation eBook - Advanced solutions

Unidirectional Security for Power Generation eBook - Advanced solutions

Generating unit segmentation - compliance benefits through improved securityProtecting the protective relays - a new approach to resilienceProtecting…
Read more
Turbine Monitoring and Diagnostics whitepaper

Turbine Monitoring and Diagnostics eBook

Persistent, targeted attacksAttacks via remote turbine service centersConventional turbine monitoring & diagnostics vs. remote monitoring with  Unidirectional Security…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

Living at the Edge – Visibility into Edge Devices | Episode #98

Read more

Cybersecurity In A Harsh Environment - Yosi Shneck | Episode #57

Yosi Shneck, long time CSO at Israel Electric Company, talks about his experience leading cybersecurity efforts in a…
Read more

Addressing "Weak Link" Vendors in the Power Grid - Dr. Joseph Baugh | Episode #52

CIP-013 is intended to reduce supply chain risks. What are the rules? What are they costing? Are they…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

Living at the Edge – Visibility into Edge Devices | Episode #98

Read more

Cybersecurity In A Harsh Environment - Yosi Shneck | Episode #57

Yosi Shneck, long time CSO at Israel Electric Company, talks about his experience leading cybersecurity efforts in a…
Read more

Addressing "Weak Link" Vendors in the Power Grid - Dr. Joseph Baugh | Episode #52

CIP-013 is intended to reduce supply chain risks. What are the rules? What are they costing? Are they…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety is the top priority at nuclear generators, but computer automation and computer connectivity are both important to…
Read more

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety is the top priority at nuclear generators, but computer automation and computer connectivity are both important to…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox