A large number of government agencies and private organizations have SCADA (supervisory control and data acquisition) or industrial control systems (ICS). The benefits of these technologies come with ...
The U.S. Department of Homeland Security's ICS-CERT has been regularly issuing vulnerability advisories for SCADA products over the past couple of years, and vendors increasingly have been issuing ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) are releasing this joint ...
With antiquated gear running the country’s industrial control systems that oversee critical infrastructure, it’s no shock attackers targeting SCADA networks do their fair share of reconnaissance ...
Joint advisory issued by U.S. government agencies for industrial controls (Source: CISA) U.S. government agencies, including the Department of Energy, the Cybersecurity and Infrastructure Security ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
An alert from the Department of Homeland Security late last week urges private- and public-sector industrial control system (ICS) owners to be proactive in auditing the security, particularly, ...
Army Cyber Command has listed ICS-SCADA systems as one of five cyber defense priorities. (Maj. Ray McCulloch/Army) The Department of Defense’s cyber teams have typically defended IP-based networks, ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) yesterday released this ...
Radiflow, a pioneer developer of ICS/SCADA network security solutions, today introduced the iSID Intrusion Detection System for OT networks. Complementing Radiflow's comprehensive line of network ...
As utilities get smarter and more connected, the threat landscape for energy systems becomes vaster and more dangerous than ever before. A layered defense should consist of a combination of security ...
Actions to Take Today to Protect ICS/SCADA Devices: • Enforce multifactor authentication for all remote access to ICS networks and devices whenever possible. • Change all passwords to ICS/SCADA ...