This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Home » NERC CIP standards increase requirements for threat visibility, detection for critical infrastructure
In the U.S., on March 15, President Joe Biden signed a $1.5 trillion omnibus spending bill that requires critical infrastructure providers and federal agencies to promptly report cyberattacks to the Cybersecurity and Infrastructure Security Agency (CISA). Not knowing you’ve been hacked is no longer a free pass to avoid reporting that you’ve been hacked. It’s more likely the ticket to large fines and bad press — both undesirable side effects that can be avoided through the visibility that test access points (TAPs) provide.
Grid modernization has created an explosion of network-connected equipment, exposing utilities to a wide range of potential threats from nation states, criminals, disgruntled employees, and accidental misconfiguration (which happens far more often than you may think). These new network connections from supervisory control and data acquisition (SCADA) equipment and others exposes previously air gapped industrial control systems to the internet … and hackers.