Regulating Nuclear Cyber Security: The Core Issues

Cyber security for nuclear power plants in the U.S. got its start as an industry best practice. Subsequent  to the attacks of 9/11, many aspects of U.S. security were bolstered. Nuclear power plants were considered among the most critical of critical infrastructure assets and therefore in need of additional security. Industry efforts were noteworthy and significant progress was made. Nevertheless, the U.S. Nuclear Regulatory Commission (NRC) determined that industry efforts were insufficient and published a new cyber security rule in 2009 and cyber security guidance in 2010.

Spotlight

Axenic Ltd

Axenic is an independent information security and privacy consultancy specialising in governance, risk and assurance. Our mission is to provide high-quality information security and privacy advice to help and support our clients to achieve their business goals and objectives.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More
news image

Cybersecurity in the Cloud White Paper

whitePaper | July 1, 2023

Cloud services have changed the face of business, offering scalability, efficiency and cost savings not available with onpremises IT infrastructure. The cloud makes it easier for organizations to manage the ever-increasing amount of data passing through their systems, helping teams communicate and collaborate across different locations. By enhancing the ability to access and manage information, the cloud has introduced a new way of approaching productivity and security – and has transformed how we work.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More
news image

How to Build and Mature Your AppSec Program

whitePaper | January 24, 2023

Achieving an optimal security posture for your business happens when technology, automation, infrastructure, architecture, and security policies are in alignment across the company. This white paper provides concrete strategies to mature your AppSec program and achieve code security at scale based on your organization’s needs.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More

Spotlight

Axenic Ltd

Axenic is an independent information security and privacy consultancy specialising in governance, risk and assurance. Our mission is to provide high-quality information security and privacy advice to help and support our clients to achieve their business goals and objectives.

Events