To meet the challenge against advanced persistent threats like Stuxnet, Norman ASA, a global security leader, www.norman.com, has developed the Norman SCADA Protection (NSP) system to protect against ...
In this sixth article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and ...
ReVuln, a Malta-based security startup that specializes in vulnerability research, is working on a product that could allow companies to protect their SCADA (supervisory control and data acquisition) ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
Industry experts from Emerson, Schneider Electric and Siemens Digital Industries reveal how manufacturers can assess vulnerabilities to protect aging SCADA systems from escalating cybersecurity ...
As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability ...
Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are critical as they are used to monitor and control the delivery of essential services such as ...
There was a time when the thought of hacking a heating, ventilation, and air conditioning (HVAC) system would have been more likely to be part of a fictional movie plot than a news story. Yet the ...
The ISA-112 Part 1 standard provides a vendor-neutral and technology-independent framework for the long-term management of ...
The ease with which TCP/IP enables one to connect networks has been a huge boon for the power generation industry. Far-flung operations can be hooked up to the network and controlled remotely. And ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results