Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
In this second of two reports, we continue with a summary of the January 2006 BlackHat Federal Conference presentation by David Maynor, who was at that time an R&D research engineer for Internet ...
Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
A defense-in-depth architecture built around a dual-data model reduces the risk of supervisory control and data acquisition networks being hacked or their data being stolen. The dual-data approach ...
LONDON -- At the UTC Telecom Conference 2006 today, Thales unveiled new functionality for its pioneering Datacryptor(r) Select Application (SA) SCADA security solution introduced last year. The ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Not all that long ago, the cybersecurity ...
Radiflow, a pioneer developer of ICS/SCADA network security solutions, today introduced the iSID Intrusion Detection System for OT networks. Complementing Radiflow's comprehensive line of network ...
The ease with which TCP/IP enables one to connect networks has been a huge boon for the power generation industry. Far-flung operations can be hooked up to the network and controlled remotely. And ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
Industrial control systems, including SCADA (supervisory control and data acquisition) have come under the security spotlight in recent years following a sprinkling of incidents – most notably the ...
Forbes contributors publish independent expert analyses and insights. Tony Bradley covers the intersection of tech and entertainment. Businesses of all sizes struggle to implement effective ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results