Industrial control systems are ubiquitous and integral to social infrastructures such as electric and water utilities, and our oil/gas, chemical, pipeline, and transportation systems. Not surprisingly ...
Authenticating and authorizing the personnel who operate, update and maintain manufacturing systems in industrial automation applications is typically accomplished using magnetic stripe cards, smart ...
Defense-in-depth is a concept that is already widely deployed by many organizations within their IT infrastructures. However, many organizations do not apply it to their industrial control system (ICS ...
Four federal agencies have warned that hacking groups have developed tools to attack technology used in factories, utilities, and other industrial settings, potentially allowing hackers to shut down ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Industrial systems are increasingly targeted by ransomware, and attacks ...
A joint cybersecurity advisory issued by CISA, NSA, FBI, and the Department of Energy (DOE) warns of government-backed hacking groups being able to hijack multiple industrial devices using a new ...
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? A recent incident where a likely nation-state threat ...
Cybersecurity company Nozomi Networks Labs has warned the industrial control system (ICS) security community about 5 vulnerabilities affecting Mitsubishi safety PLCs. In a new report, the company said ...
A virus that causes catastrophic damage to a turbine and generator–could it really happen? The Aurora generator test done for the Department of Homeland Security (DHS) by Idaho National Labs ...
All the advances being made in authentication are going to have to wait for the users to wash their hands and remove their hats before security can be strengthened at many industrial sites. Such sites ...