Cyber Security and Privacy Issues in Smart Grids

WHILE technology and innovation continue to modernize industry, our electric power system has been maintained in the same way for decades. The increasing load and consumption demands increase electricity complications, such as voltage sags, black outs, and overloads. Meanwhile, the current electrical network contributes greatly to carbon emissions. The United States’ power system alone takes up 40% of all nationwide carbon dioxide emissions [46]. Considering both economic and environmental interests, substantial changes must be made to such an unstable and inefficient system. Therefore, many nations (e.g., U.S., EU, Canada, China, Australia, South Africa, etc.) are now modernizing their power grids [42]. They believe that they not only require reliability, scalability, manageability, and extensibility, but also that they should be secure, interoperable, and cost-effective. Such an electric infrastructure is called a “smart grid.”

Spotlight

SecuredTouch

SecuredTouch is a pioneer in behavioral biometrics for mobile, delivering continuous authentication technologies to strengthen security and reduce fraud while improving customers digital experience. SecuredTouch seamlessly collects and analyzes a dynamic set of over 100 different behavioral parameters like keyboard-typing, scroll-velocity, touch pressure and finger size to automatically create a unique user behavioral profile. Our mobile-optimized solutions require no enrollment, they are easy to implement, and provide real time alerts when suspicious activity is detected from login to logout.

OTHER WHITEPAPERS
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More

Spotlight

SecuredTouch

SecuredTouch is a pioneer in behavioral biometrics for mobile, delivering continuous authentication technologies to strengthen security and reduce fraud while improving customers digital experience. SecuredTouch seamlessly collects and analyzes a dynamic set of over 100 different behavioral parameters like keyboard-typing, scroll-velocity, touch pressure and finger size to automatically create a unique user behavioral profile. Our mobile-optimized solutions require no enrollment, they are easy to implement, and provide real time alerts when suspicious activity is detected from login to logout.

Events