Image

How to Keep Your Networks Secure

Feb. 26, 2015
Cyber attacks have increased in volume and sophistication. How to keep your networks secure?

Cyber attacks have increased in volume and sophistication. How to keep your networks secure? More and more the industry is looking at continuous monitoring, where applications watch activity throughout the network for signs of incursion.

This session at the 2015 NRECA Annual Meeting presents three approaches to continuous monitoring–two commercially available options, and one research project under-way at CRN–and explains how continuous monitoring can help protect both customer data and sensitive control systems.

About the Author

Vito Longo | Technology Editor

Vito received his B.S. degree in electrical engineering from Louisiana State University. He was a consultant for several Louisiana rural electric cooperatives. At Power Technologies Inc. in Schenectady, New York, he performed transmission line design criteria studies for international utilities and R&D on compact and high phase order transmission lines. After five years with PG&E, he joined EPRI as a project manager and advanced the state-of-practice in foundation analysis and design, lightning performance calculations, static and dynamic conductor thermal ratings, transmission line optimization studies, and software delivery of research results.

Vito joined T&D World in 2006 as the technology editor.

Voice your opinion!

To join the conversation, and become an exclusive member of T&D World, create an account today!