Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
The ISA-112 Part 1 standard provides a vendor-neutral and technology-independent framework for the long-term management of ...
ISA prohibits the entry of any ISA intellectual property (“ISA IP”), including standards, publications, training or other materials into any form of Artificial Intelligence (AI) tools, such as ChatGPT ...
The U.S. currently faces a growing threat from cyber-attacks against its critical infrastructure (CI) vital to our modern society. Many understand this growing threat but don’t know the origins of a ...
Last week I described real life SCADA vulnerabilities. My intent was to assist IT security people to dialogue with their executive management about security budgets. This week I will continue by ...
Is your transport infrastructure truly secure? Successful cyberattacks against Supervisory Control and Data Acquisition (SCADA) and other process control systems at airports, nuclear and petroleum ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Little-known fact: The power plant able to generate the most ...
Critical infrastructure operators that have adopted the security industry's popular risk management mindset are doing it wrong, according to Ralph Langner. Langner, the German security expert who ...
The ISA-112 Part 1 standard provides a framework for modernizing supervisory control and data acquisition systems and making them easier to design, build, operate and maintain.