Search
`
July 1, 2024

cybersecurity

Shutterstock
White House Sets 2025 Cybersecurity Priorities
The White House designated its cybersecurity priorities for fiscal 2025 in a memo Tuesday.
NERC
NERC Finds Grid Generally Reliable and Resilient
NERC found that the bulk power system was generally reliable and resilient in 2022, but forced outages among coal and natural gas plants hit their highest level in the decade.
© RTO Insider LLC
Solarium Report Warns of E-ISAC Info Sharing Shortfalls
A new report by the successor to the Cyberspace Solarium Commission warned that utilities’ relationships with the E-ISAC are not as strong as they could be.
Shutterstock
NERC Issues Cybersecurity Data Request
Registered entities must report to NERC on the cyber assets present on their systems and the potential impact of adding security monitoring software.
© RTO Insider LLC
NERC Standards Committee Sends Back Cybersecurity Proposals
NERC’s Standards Committee declined to advance a project to modify cybersecurity reporting requirements, seeking a fuller response to criticism of the proposal.
The White House
Texas RE Board/MRC Briefs: May 17, 2023
The Texas Reliability Entity’s board voted to approve the organization’s 2024 business plan and budget, along with accepting its 2022 financial statements.
NERC
NERC Board of Trustees/MRC Briefs: May 10-11, 2023
NERC's Board of Trustees on Thursday approved the organization’s first-ever Level 3 alert at its quarterly meeting.
NERC
Cancel: Dragos Breach Did Not Compromise E-ISAC
Cybersecurity firm Dragos, a partner of the Electricity Information Sharing and Analysis Center, suffered a cyber breach that exposed customer information.
NERC
NERC Publishes Cybersecurity Planning Framework
NERC laid out a framework for transmission planners and planning coordinators to include cybersecurity in planning studies to address rapidly evolving threats.
© RTO Insider LLC
PJM Hears from White House Official on Security
A White House official urged participants in PJM’s General Session to engage in closer collaboration at all levels as cyber and physical security threats morph.

Want more? Advanced Search