As renewable energy expands, the systems that support wind, solar, and battery storage must operate with precision and ...
Threats to aging supervisory control and data acquisition (SCADA) systems, which monitor and control key industrial processes in critical infrastructure, have been growing in recent years. The latest ...
As utilities get smarter and more connected, the threat landscape for energy systems becomes vaster and more dangerous than ever before. A layered defense should consist of a combination of security ...
In a slide presentation from the January 2006 BlackHat Federal Conference, David Maynor, was who was at that time an R&D research engineer for Internet Systems Security (ISS) X-Force and colleague ...
Friend and colleague Professor Michael Miora, CISSP-ISSMP, FBCI has contributed the following interesting case study to the series of columns on the security of supervisory control and data ...
As utilities become more interconnected, and increasingly reliant on remote communications capabilities including automated metering, their elderly supervisory control and data acquisition (SCADA) ...
As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
The use of Supervisory Control and Data Acquisition (SCADA) devices is growing. That growth is expected to continue to soar. According to research firm Frost & Sullivan SCADA revenues will grow from ...
SCADA systems are ever more open to security threats – Amol Sarwate explains how to mitigate the risks All around us, critical IT services keep our homes powered, water coming to the taps, and ...
New data points illustrate just what a turning point Stuxnet truly was in SCADA security: Twenty times more software flaws have been discovered in industrial-control systems (ICS)/SCADA systems since ...
Don’t expect any of these attacks on SCADA and ICS to slow any time soon. In his talk, “Who’s Really Attacking Your ICS Devices?”, presented recently at Black Hat Europe 2013, Trend Micro Threat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results