With antiquated gear running the country’s industrial control systems that oversee critical infrastructure, it’s no shock attackers targeting SCADA networks do their fair share of reconnaissance ...
A trio of researchers have uncovered 25 security vulnerabilities in various supervisory control and data acquisition (SCADA) and industrial control system (ICS) protocols. A trio of researchers have ...
Within the energy industry, networked equipment can help enterprises make more informed business decisions, reduce environmental impacts, provide better customer service and improve safety. But ...
ABB has won an order worth $43m from Eskom, South Africa’s leading utility, to supply medium-voltage switchgear as well as protection and SCADA (supervisory control and data acquisition) equipment for ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. The threat landscape facing companies in ...
SAN FRANCISCO, CA—nCircle, the leader in information risk and security performance management, today announced expanded coverage for the SCADA systems and devices that manage and control critical ...
It's been seven years since the game-changer Stuxnet worm was unearthed and thrust the industrial control sector to a new reality where cyberattacks could sabotage even air-gapped physical plant ...
Not all SCADA systems are created equal. As the brain of your automated operations, the right SCADA system can ease communication with RTUs and PLCs, today and tomorrow. In a session Tuesday morning ...
Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and ...
Rob Lee got the idea for SCADA and Me – a barely-technical picturebook that introduces industrial control systems to novices – from a group that should have already known what SCADA systems were but ...
Recently I was conducting some research on critical infrastructure security for the next version of my book, the Cyber Commander’s eHandbook. During that work, I repeatedly encountered a particular ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results