News

An estimated $590M was spent on smart grid security technologies in 2010 and by 2016 that number is projected to surpass $2B.
A smart grid is a communication and information technology (IT) system used for consumption, delivery, and generation of power. It uses two-way communication to develop an automated and widely ...
Smart meters, smart grids, smart distributed energy resources (DERs), smart energy management, and demand response technology connected to a host of customer systems, smart chargers, and energy ...
"By focusing on security controls, rather than individual vulnerabilities and threats, utility companies and smart-grid technology vendors can remediate the root cause issues that lead to ...
The smart grid is unlike other critical information infrastructures in that millions of nodes located in businesses, government installations and residences connect to the grid, a collection of ...
The smart grid network, smart grid operating center and back office are pretty much secure. The problem is when you start connecting smart-grid devices to homes, business building and factories.
Cities are turning to smart grid technology to protect against cyberattacks. Smart grids provide cybersecurity benefits and electricity more efficiently.
According to the report, the global smart grid security market will grow at a rate of over 8% during the forecast period 2019-2025.
The internet of things (IoT) and cloud technologies represent both an opportunity and a challenge for utilities. By adopting cloud-based web security, utilities have seized on a new opportunity to ...
Wurldtech Security Technologies (www.wurldtech.com), a Vancouver, British Columbia, Canada-based provider of industrial cyber security testing and certification solutions for critical infrastructure ...
A smart grid uses digital technology to transmit, distribute and deliver power to consumer in a more reliable and efficient manner than traditional electricity systems.
This article outlines the problems of securing the smart grid and current attempts then suggests a new and improved security architecture.