Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
As wastewater utilities face mounting pressure from aging infrastructure, evolving regulations, and cybersecurity threats, ...
In my previous post about mobile device security for industrial control systems (ICS), I shared several findings from Verizon about how 4G LTE addresses five key aspects of securing mobile access to ...
The ability to monitor and control distributed generation assets, on-site or from remote locations, continues to become more efficient and sophisticated. SCADA software for power control systems ...
One of the biggest benefits of Ethernet on the plant floor is the ability to remotely connect to plant floor systems. But along with the benefits of remote access come the heightened risk of ...
AI thrives on data but feeding it the right data is harder than it seems. As enterprises scale their AI initiatives, they face the challenge of managing diverse data pipelines, ensuring proximity to ...
Is critical infrastructure any more secure than it was a year ago, or five years ago? Well according to three different reports from experts, it doesn’t seem like it. Instead, it seems like critical ...
Mobile applications used to help control internet-connected SCADA (industrial control and supervisory control and data acquisition) systems are riddled with security vulnerabilities which, if ...
Google security engineer Billy Rios has publicly disclosed a remote authentication vulnerability in the Siemens SIMATIC software, which is used to control critical infrastructure systems worldwide.
Initial findings from a current Newton-Evans tracking study indicate that more North American electric utilities developing distribution automation applications are implementing control logic for ...
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines. During the spring, attackers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results