All of this can be accomplished with the use of a SCADA system within the automation process. However, none of these functions are available if the system is not designed with a reliable power source ...
Industry experts from Emerson, Schneider Electric and Siemens Digital Industries reveal how manufacturers can assess ...
To meet the challenge against advanced persistent threats like Stuxnet, Norman ASA, a global security leader, www.norman.com, has developed the Norman SCADA Protection (NSP) system to protect against ...
A risk assessment, combined with a vulnerability assessment and threat scenario analysis, specifically identifies cyber vulnerabilities that may require elimination from a pipeline system. Elimination ...
ReVuln, a Malta-based security startup that specializes in vulnerability research, is working on a product that could allow companies to protect their SCADA (supervisory control and data acquisition) ...
In this sixth article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and ...
As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability ...
Mobile applications used to help control internet-connected SCADA (industrial control and supervisory control and data acquisition) systems are riddled with security vulnerabilities which, if ...
Industrial control systems, including SCADA (supervisory control and data acquisition) have come under the security spotlight in recent years following a sprinkling of incidents – most notably the ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
The ease with which TCP/IP enables one to connect networks has been a huge boon for the power generation industry. Far-flung operations can be hooked up to the network and controlled remotely. And ...
An electronic road sign hacked to alert drivers to hoards of the undead provides a nice pedagogical example of why SCADA security is such a "big deal". Earlier this week a road sign was hacked to warn ...