Industrial control systems such as SCADA systems sit squarely at the intersection of the digital and physical worlds. They're vulnerable, they're unpatchable, and they're connected to the Internet.
Threats to aging supervisory control and data acquisition (SCADA) systems, which monitor and control key industrial processes in critical infrastructure, have been growing in recent years. The latest ...
New data points illustrate just what a turning point Stuxnet truly was in SCADA security: Twenty times more software flaws have been discovered in industrial-control systems (ICS)/SCADA systems since ...
In a slide presentation from the January 2006 BlackHat Federal Conference, David Maynor, was who was at that time an R&D research engineer for Internet Systems Security (ISS) X-Force and colleague ...
A risk assessment, combined with a vulnerability assessment and threat scenario analysis, specifically identifies cyber vulnerabilities that may require elimination from a pipeline system. Elimination ...
Friend and colleague Professor Michael Miora, CISSP-ISSMP, FBCI has contributed the following interesting case study to the series of columns on the security of supervisory control and data ...
No one disputes that there's a dire need for major change in addressing serious gaping security holes in SCADA/industrial control systems (ICS) today. Frustrated with the inertia associated with ...
The many flavors of vulnerability disclosure have a long history in the information security field. While security professionals sometimes support a moderate form of managed disclosure, the ...
Like Cliff Claven (the jovial factoid-sharing postal carrier of the syndicated television comedy, "Cheers"), I'm easily enthralled by trivia. For example, I bet you didn't know that Hells Canyon, ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...
Don’t expect any of these attacks on SCADA and ICS to slow any time soon. In his talk, “Who’s Really Attacking Your ICS Devices?”, presented recently at Black Hat Europe 2013, Trend Micro Threat ...
Mobile applications used to help control internet-connected SCADA (industrial control and supervisory control and data acquisition) systems are riddled with security vulnerabilities which, if ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results