Select Page
Advances in Cyber Security for Electric Utilities: WG15 & Black Hat

Advances in Cyber Security for Electric Utilities: WG15 & Black Hat

As a passionate champion for secure-by-design power grid systems, I’ve been part of WG15, the group defining IEC 62351 standards to enable such systems, for years.

If you’d like to learn about the future of cyber security for electric utilities, I urge you to read this article. It also provides a sneak peek into our related (and groundbreaking!) talk about power system security at Black Hat USA 2019.

Nozomi Networks and Other IEC TC57 WG15 Members Meet in Switzerland to Set 2017 Priorities for Power System Cyber Security Standards

Nozomi Networks and Other IEC TC57 WG15 Members Meet in Switzerland to Set 2017 Priorities for Power System Cyber Security Standards

MENDRISIO, Switzerland, January 17, 2017Nozomi Networks, the pioneer in cyber security and operational visibility for industrial control systems (ICS) and other Members of the International Electrotechnical Commission Technical Committee 57 Working Group 15 (IEC TC 57 WG15) met today in Lugano, Switzerland, for the first of three WG15 meetings in 2017. The working group is responsible for developing end-to-end cyber security standards for power system communications protocols.

IEC 62351 Standards for Securing Power System Communications

IEC 62351 Standards for Securing Power System Communications

To help counter the growing concern about cyberattacks aiming to disrupt power systems, industrial experts have been working together in WG15. This group, part of IEC, is defining the standards known as IEC 62351, for secure-by-design power grids.

As a member of WG 15 since 2015, I thought it might be helpful to inform you about these standards and provide an update on their status.

New BotenaGo Variant Discovered by Nozomi Networks Labs

New BotenaGo Variant Discovered by Nozomi Networks Labs

While the use of open-source programming languages has its benefits, attackers find it equally beneficial and have been utilizing Go to code malicious malware. Our research highlights a new variant of the BotenaGo malware that specifically targets Lilin security camera DVR devices, which we have named Lillin scanner.