AI can now find and exploit software vulnerabilities faster than humans can patch them. Here's what power companies need to ...
Something is happening at the grid edge that is reshaping what “essential infrastructure” means. Distributed Energy Resource ...
Supply chain attacks compromise PV systems by targeting trusted vendors, software, or hardware components, allowing attackers to infiltrate systems indirectly through legitimate channels. These ...
Ransomware attacks encrypt or lock critical PV system data and control platforms, preventing operators from accessing or managing their assets until a ransom is paid. These attacks can disrupt ...
The American Association for Dental, Oral, and Craniofacial Research (AADOCR) has announced Jacqueline Mays as the 2026 inaugural recipient of the AADOCR SCADA/Dentsply Sirona Research Award.
SymphonyAI, a global leader in Vertical AI platforms, today announced eight new industrial AI applications purpose-built for energy operators, marking the most targeted expansion of IRIS Foundry into ...
If you run automated equipment, you interact with a human machine interface (HMI) every day. It is the screen that shows what ...
Most manufacturers look to hire the "finished" engineer. Here's why that approach tends to fail and what actually works.
As of April 1, 2026, the enforcement of NERC Reliability Standard CIP-003-9 mandates that renewable energy operators transition from informal vendor management to a rigorous, evidence-based ...
CESMII’s Jonathan Wise explains that i3X doesn't replace existing industrial standards, it snaps on top of them to deliver the interoperability manufacturers have long been ...
Bentley Systems reports increased demand for digital twin technology in India’s infrastructure projects, enhancing efficiency ...
Hubbell's 765 kV, UHV arresters and switches allow utilities to manage extreme voltage levels as well as high--frequency electrical phenomena like corona and radio-influence voltage that become more ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results