Blockchain

Securing Distributed Energy Resources

Securing Distributed Energy Resources

In a recent press release, we announced that Spherical | Analytics (S|A) had been chosen to participate in a use case consortium sponsored by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE). This opportunity places us in a position to put our technology at the forefront of collaborating on cybersecurity solutions for critical infrastructure.

The Cooperative Research and Development Agreement (CRADA) focuses on securing information exchanges among IIoT (Industrial Internet of Things) controllers from distributed energy resources (DERs) in their operating environments. These operating environments can be some of the most challenging from a physical and digital architecture standpoint and are persistently confronted with myriad cyber and climate risk challenges.

Data Provenance Part 3: Trust

Data Provenance Part 3: Trust

In the first two parts of our series on data provenance, we set out to define some key terms related to data and trust. Part 1 focused on Asset Grade Data (AGD), an entirely new class of trusted data that is so pedigreed, provenanced, proofed, auditable, and immutable that it becomes beyond reproach and is elevated to the level of an asset itself. Part 2 extended those principles and applied them to the concept of Ground Truth: point of origin instrumentation data with the highest possible levels of persisted pedigree, provenance, and security.

This third and final part will evidence the way Context Labs (CXL) and Spherical | Analytics (S|A) have applied those principles of AGD and Ground Truth towards different projects and programs.