A large number of government agencies and private organizations have SCADA (supervisory control and data acquisition) or industrial control systems (ICS). The benefits of these technologies come with ...
ICS/SCADA researchers from Russia have published online a list of popular industrial systems that come packaged with default passwords in hopes that the vendors--which include a who's who in ICS/SCADA ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) are releasing this joint ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
A report on the state of SCADA and ICS security points out that critical infrastructure operators are caught between hackers and a lack of vendor and executive support. Critical infrastructure ...
Joint advisory issued by U.S. government agencies for industrial controls (Source: CISA) U.S. government agencies, including the Department of Energy, the Cybersecurity and Infrastructure Security ...
Army Cyber Command has listed ICS-SCADA systems as one of five cyber defense priorities. (Maj. Ray McCulloch/Army) The Department of Defense’s cyber teams have typically defended IP-based networks, ...
A recent batch of vulnerabilities in Honeywell building automation system software epitomize the linger security issues around SCADA and industrial control systems. A handful of worrisome ...
Radiflow, a pioneer developer of ICS/SCADA network security solutions, today introduced the iSID Intrusion Detection System for OT networks. Complementing Radiflow's comprehensive line of network ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) yesterday released this ...
Sophisticated cyber-attacks known as Advanced Persistent Threats (APT) are a growing challenge to the energy sector of our nation’s critical infrastructure. These attacks can largely be attributed to ...
Actions to Take Today to Protect ICS/SCADA Devices: • Enforce multifactor authentication for all remote access to ICS networks and devices whenever possible. • Change all passwords to ICS/SCADA ...