How to Mitigate Microsoft Vulnerabilities

(CVE 2020-0601), (CVE 2020-0609/2020-0610), (CVE 2020-0611) Source: Trace Bellassai   Several serious security vulnerabilities have been made recently made public which affect Microsoft operating systems. Three vulnerabilities that are of significant...

Read More

Nation-State Supply Chain Attacks for Dummies and You Too

Back in October 2018, “Bloomberg” recounted a Chinese supply-chain attack on Supermicro motherboards used in servers for Amazon, Apple, and more than 20 other companies. the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Here is how I...

Read More

Software Integrity and Authenticity

Source: Michele Wright, Product Manager As electric utilities look towards furthering their compliance programs for 2020, consideration needs to be made around software integrity and authenticity. Of the new NERC CIP requirements coming into effect next year (July 1,...

Read More

Energy Sector Asset Management

A PRACTICAL GUIDE – ENERGY SECTOR ASSET MANAGEMENTOver the past several months, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) has been working on a cybersecurity project involving asset...

Read More


Source: Barbara Wert, Sr. Regulatory Compliance Specialist RoHS – RECAST v. AMENDMENT Contrary to what many believe, the updated requirement under 2015/863 for compliance to ten substances rather than six does not constitute the “next generation” of RoHS. As of...

Read More

We like to eat cookies.

This site uses cookies to ensure
the best user experience. 

Thank you for visiting our site.

About Cookies  |  Privacy Policy

I would like to opt-out of cookies.

Thank you for visiting our site!