Authenticating and authorizing the personnel who operate, update and maintain manufacturing systems in industrial automation applications is typically accomplished using magnetic stripe cards, smart ...
Defense-in-depth is a concept that is already widely deployed by many organizations within their IT infrastructures. However, many organizations do not apply it to their industrial control system (ICS ...
Four federal agencies have warned that hacking groups have developed tools to attack technology used in factories, utilities, and other industrial settings, potentially allowing hackers to shut down ...
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? A recent incident where a likely nation-state threat ...
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report. The systems that power the manufacturing, power and water plants, the ...
All the advances being made in authentication are going to have to wait for the users to wash their hands and remove their hats before security can be strengthened at many industrial sites. Such sites ...
Cybersecurity company Nozomi Networks Labs has warned the industrial control system (ICS) security community about 5 vulnerabilities affecting Mitsubishi safety PLCs. In a new report, the company said ...
A virus that causes catastrophic damage to a turbine and generator–could it really happen? The Aurora generator test done for the Department of Homeland Security (DHS) by Idaho National Labs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results