si-icon-eightbarfeature

2022-09-24 00:39:24 By : Ms. Leslie Youcable

DOE Invests $12M in Cybersecurity Research for Energy Grid

In June 2021, CNN asked U.S. Secretary of Energy Jennifer Granholm if U.S. enemies could shut down the power grid. She said they could. Meanwhile, the concern over energy grid attacks has increased with the Russian attack on Ukraine.

Attackers could take down the U.S. power grid by hitting only a few substations, said Jon Wellinghoff, former chairman of the Federal Energy Regulatory Commission. Due to growing concerns, the Department of Energy announced $12 million in funding for research projects. These aim to more securely develop the next generation of energy systems. What does this mean for the industry?

One problem is the threat of a complete shutdown of the energy grid. Following that, attacks in the energy industry are costly to both utilities and consumers. The 17th annual Cost of a Data Breach Report ranked the energy industry as fifth in costs of a data breach. The majority of cases were external attacks, and only 2% were inside jobs. These breaches cost an average of $4.65 million. In 2021, most attacks in the energy industry were social engineering attacks. Other types of common attacks include system intrusion and web applications.

The $12 million grant funding creates the following six programs:

“Investing in cutting-edge cyber security technology keeps us at the forefront of global innovation and protects America’s power grid in the face of increasing cyber threats from abroad,” said Granholm in a statement. “This funding will bolster our commitment to a secure and resilient clean energy future by fortifying American electricity systems and building a stronger grid.”

The U.S. needs to be looking for ways to secure the next-generation energy grid. That way, the nation can prevent costly shutdowns. Grants such as the recent $12 million can help ensure that. After all, the U.S. needs to remain ahead of attackers as new energy systems are developed.

Jennifer Goforth Gregory is a freelance B2B technology content marketing writer specializing in cybersecurity. Other areas of focus include B2B, finance, tec...

4 min read - This is a time of major changes for businesses and agencies. That includes the move to the cloud and the shift to being digital-first. So, cybersecurity has moved to a front-and-center position in many companies and industries. When talking about…

3 min read - Corporate clients and cloud service providers (CSPs) are both responsible for cloud security. Clients remain accountable for governance and compliance. However, their other duties will vary depending upon the type of cloud deployment. What can cloud-native security controls do for…

4 min read - 5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content delivery and digital engagement anywhere. It enables businesses with new use cases and integrated security needs to have a trusted…

In June 2021, CNN asked U.S. Secretary of Energy Jennifer Granholm if U.S. enemies could shut down the power grid. She said they could. Meanwhile, the concern over energy grid attacks has increased with the Russian attack on Ukraine. Attackers could take down the U.S. power grid by hitting only a few substations, said Jon Wellinghoff, former chairman of the…

The FBI has warned the Food and Agriculture (FA) sector that ransomware actors may be preparing to attack agricultural cooperatives during critical planting and harvest seasons. This could lead to disrupted operations, financial loss and a negative impact on the food supply chain. The FBI Private Industry Notification states that since 2021, ransomware variants have impacted multiple agricultural cooperatives. Initial…

In April 2022, a bipartisan group of congressmen introduced the Satellite Cybersecurity Act. Senators Gary Peters (D-MI) and John Cornyn (R-TX) authored the bill, and Congressman Andrew R. Garbarino (R-NY) joined with Congressman Tom Malinowski (D-NJ) to introduce the bill to the U.S. House of Representatives.“We depend on satellites for everything from driving to work to defending our country, yet our…

Zero-day vulnerabilities are increasing. Attackers can exploit these weaknesses in the wild before a patch becomes publicly available. Until white hats mitigate a zero-day vulnerability, actors can freely exploit it to breach data, systems and networks. According to a Mandiant Threat Intelligence report, the number of zero-day exploits in 2021 grew more than 100% compared to the previous record set…

Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.