Waterfall logo white

Power

Welcome to the Power resources page. Here you’ll find a compiled collection of useful information, tools, and resources about industrial cybersecurity for Power including generating, transmitting, nuclear, and all other related aspects.

  • All
  • Blog
  • Case studies
  • eBook
  • Podcast
  • Video

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

How to Prepare for A Cyber Attack on the Grid?

Remember the Y2K bug? That special party you attended with your friends, on December 31st 1999, where the…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

Edge network monitoring looks at the lowest level and arguably most important industrial networks, not the networks closest…
Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

Threats to the Grid in North America and Europe

Lately, we’ve seen important announcements in the news focused on shoring up our power grid against cyber threats.…
Read more

How to Prepare for A Cyber Attack on the Grid?

How to Prepare for A Cyber Attack on the Grid?

Remember the Y2K bug? That special party you attended with your friends, on December 31st 1999, where the…
Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

Threats to the Grid in North America and Europe

Lately, we’ve seen important announcements in the news focused on shoring up our power grid against cyber threats.…
Read more

4096 Bits to Hack a Nuclear Reactor

In the first 10 pages of “Anéantir”, the latest fictional book by Michel Houellebecq, famed French novelist, he…
Read more

Waterfall and HTSS collaborate to protect large European power company

Safely enabling OT visibility for electric power Rosh HaAyin, Israel – November  24, 2021 – Waterfall Security Solutions,…
Read more

How to Prepare for A Cyber Attack on the Grid?

How to Prepare for A Cyber Attack on the Grid?

Remember the Y2K bug? That special party you attended with your friends, on December 31st 1999, where the…
Read more

Our Summary of Power Grid Cyber Security at the IEC 61850 Smart Grid Conference

Reframing the Wild Cyber GOOSE Chase with Sensible Segmentation A cornerstone of our critical energy infrastructure is the…
Read more

Threats to the Grid in North America and Europe

Lately, we’ve seen important announcements in the news focused on shoring up our power grid against cyber threats.…
Read more

4096 Bits to Hack a Nuclear Reactor

In the first 10 pages of “Anéantir”, the latest fictional book by Michel Houellebecq, famed French novelist, he…
Read more

Waterfall and HTSS collaborate to protect large European power company

Safely enabling OT visibility for electric power Rosh HaAyin, Israel – November  24, 2021 – Waterfall Security Solutions,…
Read more

Rail Operations Center

Rail Operations Center
Rail Operations Center

Rail Operations Center

Protecting Rail Vital Networks From Imminent Cyber Threats Customer/ Partner: North American major metropolitan rail network. Customer Requirement:…
Read more
Cybersecurity For Balancing Authorities

Cybersecurity For Balancing Authorities

Secure Communications With Partner Utility Iccp Servers Customer/ Partner: North American Balancing Authority. Customer Requirement: Protect Energy Management…
Read more
Securing The Digital Nuclear Generation Perimeter

Securing The Digital Nuclear Generation Perimeter

Protecting The Connected Nuclear Power Plant From Evolving Cyber Threats Customer/ Partner: Commercial nuclear power producer in the…
Read more
Securing Power Generation At New Brunswick Power

Securing Power Generation At New Brunswick Power

Partnering With Énergie NB Power To Secure Production And Assure Compliance Customer/ Partner: Énergie NB Power. Customer Requirement:…
Read more
Cybersecurity For Hydropower Generation

Cybersecurity For Hydropower Generation

Protecting The Connected Hydropower Plant From Evolving Cyber Threats Customer/ Partner: Canadian power generation company. Customer Requirement: To…
Read more

Rail Operations Center

Rail Operations Center
Rail Operations Center

Rail Operations Center

Protecting Rail Vital Networks From Imminent Cyber Threats Customer/ Partner: North American major metropolitan rail network. Customer Requirement:…
Read more
Cybersecurity For Balancing Authorities

Cybersecurity For Balancing Authorities

Secure Communications With Partner Utility Iccp Servers Customer/ Partner: North American Balancing Authority. Customer Requirement: Protect Energy Management…
Read more
Securing The Digital Nuclear Generation Perimeter

Securing The Digital Nuclear Generation Perimeter

Protecting The Connected Nuclear Power Plant From Evolving Cyber Threats Customer/ Partner: Commercial nuclear power producer in the…
Read more
Securing Power Generation At New Brunswick Power

Securing Power Generation At New Brunswick Power

Partnering With Énergie NB Power To Secure Production And Assure Compliance Customer/ Partner: Énergie NB Power. Customer Requirement:…
Read more
Cybersecurity For Hydropower Generation

Cybersecurity For Hydropower Generation

Protecting The Connected Hydropower Plant From Evolving Cyber Threats Customer/ Partner: Canadian power generation company. Customer Requirement: To…
Read more

Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook
Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook

About 440 nuclear generators in 32 countries serve a vital role in the world economy – they supply…
Read more
Unidirectional Security for Power Generation eBook - Advanced solutions

Unidirectional Security for Power Generation eBook - Advanced solutions

The pervasive threat environment continues to worsen, attack tools continue to become more powerful, and today’s targeted ransomware…
Read more
Turbine Monitoring and Diagnostics whitepaper

Turbine Monitoring and Diagnostics whitepaper

A variety of turbines are used routinely in power generation: steam turbines, water turbines and combustion/gas turbines. Wind…
Read more

Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook
Deterministic Network Security for Nuclear Generators eBook

Deterministic Network Security for Nuclear Generators eBook

About 440 nuclear generators in 32 countries serve a vital role in the world economy – they supply…
Read more
Unidirectional Security for Power Generation eBook - Advanced solutions

Unidirectional Security for Power Generation eBook - Advanced solutions

The pervasive threat environment continues to worsen, attack tools continue to become more powerful, and today’s targeted ransomware…
Read more
Turbine Monitoring and Diagnostics whitepaper

Turbine Monitoring and Diagnostics whitepaper

A variety of turbines are used routinely in power generation: steam turbines, water turbines and combustion/gas turbines. Wind…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

Living at the Edge – Visibility into Edge Devices | Episode #98

Edge network monitoring looks at the lowest level and arguably most important industrial networks, not the networks closest…
Read more

Cybersecurity In A Harsh Environment - Yosi Shneck | Episode #57

Yosi Shneck, long time CSO at Israel Electric Company, talks about his experience leading cybersecurity efforts in a…
Read more

Addressing "Weak Link" Vendors in the Power Grid - Dr. Joseph Baugh | Episode #52

CIP-013 is intended to reduce supply chain risks. What are the rules? What are they costing? Are they…
Read more

Living at the Edge – Visibility into Edge Devices | Episode #98

Living at the Edge – Visibility into Edge Devices | Episode #98

Edge network monitoring looks at the lowest level and arguably most important industrial networks, not the networks closest…
Read more

Cybersecurity In A Harsh Environment - Yosi Shneck | Episode #57

Yosi Shneck, long time CSO at Israel Electric Company, talks about his experience leading cybersecurity efforts in a…
Read more

Addressing "Weak Link" Vendors in the Power Grid - Dr. Joseph Baugh | Episode #52

CIP-013 is intended to reduce supply chain risks. What are the rules? What are they costing? Are they…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety is the top priority at nuclear generators, but computer automation and computer connectivity are both important to…
Read more

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety & Cybersecurity for Nuclear Generators | Recorded Webinar

Safety is the top priority at nuclear generators, but computer automation and computer connectivity are both important to…
Read more

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

AVEVA | Webinar | Engineering Grade Security for Water Utilities
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox