
Securing Inverter-Based Resources with IEEE 2030.5: Why It Matters for Utilities
IEEE 2030.5 is helping utilities secure inverter-based resources (IBRs) by enabling standardized, encrypted communication across distributed energy systems. Learn how it supports cybersecurity, where it’s being adopted, and how to integrate it into a broader grid security strategy.
From Solar to Storage: A Quick Guide to DER Cyber Entry Points
As solar, storage, and inverter-based DERs expand across the grid, so do the cyber risks. This blog explores common DER entry points, real-world vulnerabilities, and practical frameworks utilities can use to get ahead of the threat.
Most IBRs Bypass Traditional SCADA Firewalls: Understanding the Emerging Cybersecurity Challenges
Most inverter-based resources (IBRs) bypass traditional SCADA firewalls, creating a cybersecurity blind spot at the edge of the grid. Learn why visibility, ownership, and control must evolve — and how utilities can lead the next era of secure energy modernization.
What Makes an IBR Cyber Incident Unique?
Inverter-based resources (IBRs) introduce cybersecurity risks unlike traditional IT or OT assets. From misconfigurations to rapid operational impacts, learn what makes IBR cyber incidents so unique — and how to prepare your team for emerging threats in the evolving energy grid.
Inverter Misconfigurations = Risk: Why Every Setting Matters
Inverter misconfigurations can lead to unexpected outages, security vulnerabilities, and compliance concerns. This post explores why even small setting changes on inverter-based resources (IBRs) can have big consequences — and what utilities can do to reduce their risk.
Understanding the Role of Inverter-Based Resources (IBRs) in Grid Stability
As inverter-based resources (IBRs) become a dominant force in power generation, they’re also reshaping how we think about grid stability, cybersecurity, and NERC compliance. This post explores why IBRs behave differently from traditional generators, what makes them vulnerable, and how utilities can prepare for the regulatory and operational challenges ahead.
Prioritizing Training for NERC CIP Compliance: What the Data Tells Us
Enhancing team training is the top priority for many utilities when it comes to NERC CIP compliance. Learn why focusing on role-based training, streamlining compliance efforts, and strengthening cybersecurity practices creates a stronger foundation for audit readiness and regulatory success.
Navigating NERC CIP Audits: Turning Challenges into Opportunities
Preparing for a NERC CIP audit can feel overwhelming, but by addressing key challenges—staying updated on rule changes, managing documentation, training your team, and conducting effective audits—you can turn the audit process into a valuable opportunity. Learn practical strategies to boost your utility’s compliance program and ensure success.
Exploring the TSA Pipeline Security Guidelines Against the NERC CIP Standards
As it stands right now, pipeline owners and operators are obligated to perform a gap assessment of their existing security practices against the TSA Pipeline Security Guidelines.
Are You Ready for Extreme Weather?
If you follow the events of the utility industry, then you are likely aware of the focus being placed on ERCOT and Texas-based utilities related to the February 2021 snowstorm event that caused days of power outages, billions of dollars in damage, and monumental regulatory scrutiny. This headline news has caused many utilities to become
Biden’s 100-day Plan to Address Cybersecurity Risks to the U.S. Electric System
On April 20, 2021, the Biden Administration announced a series of actions included in its 100-day plan to improve the cybersecurity of our nation’s electric infrastructure. The plan is intended to drive significant cybersecurity improvements for the protection of “Electricity Operations from Increasing Cyber Threats”. Note: This plan does not yet appear to be available