This blog, which has been operating since 2013 on a different platform, primarily discusses vulnerability management and vulnerability databases, as well as new developments in the NERC CIP cybersecurity standards - especially regarding use of the cloud.