Industry experts from Emerson, Schneider Electric and Siemens Digital Industries reveal how manufacturers can assess ...
In this second of two reports, we continue with a summary of the January 2006 BlackHat Federal Conference presentation by David Maynor, who was at that time an R&D research engineer for Internet ...
Like Cliff Claven (the jovial factoid-sharing postal carrier of the syndicated television comedy, "Cheers"), I'm easily enthralled by trivia. For example, I bet you ...
In a slide presentation from the January 2006 BlackHat Federal Conference, David Maynor, was who was at that time an R&D research engineer for Internet Systems Security (ISS) X-Force and colleague ...
A Russian security company plans to release an upgraded exploit pack for industrial control software that incorporates a raft of new vulnerabilities released by an Italian security researcher. A ...
The ISA-112 Part 1 standard provides a vendor-neutral and technology-independent framework for the long-term management of ...
The use of Supervisory Control and Data Acquisition (SCADA) devices is growing. That growth is expected to continue to soar. According to research firm Frost & Sullivan SCADA revenues will grow from ...
A defense-in-depth architecture built around a dual-data model reduces the risk of supervisory control and data acquisition networks being hacked or their data being stolen. The dual-data approach ...
There was a time when the thought of hacking a heating, ventilation, and air conditioning (HVAC) system would have been more likely to be part of a fictional movie plot than a news story. Yet the ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
The U.S. currently faces a growing threat from cyber-attacks against its critical infrastructure (CI) vital to our modern society. Many understand this growing threat but don’t know the origins of a ...