SAN FRANCISCO--(BUSINESS WIRE)--RSA Conference – Indegy, the industrial cyber security company, today announced that it was named winner of the “The Best Next Gen ICS/SCADA Security Solution” in the 4 ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
Radiflow, a pioneer developer of ICS/SCADA network security solutions, today introduced the iSID Intrusion Detection System for OT networks. Complementing Radiflow's comprehensive line of network ...
Sophisticated cyber-attacks known as Advanced Persistent Threats (APT) are a growing challenge to the energy sector of our nation’s critical infrastructure. These attacks can largely be attributed to ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) are releasing this joint ...
Joint advisory issued by U.S. government agencies for industrial controls (Source: CISA) U.S. government agencies, including the Department of Energy, the Cybersecurity and Infrastructure Security ...
A trio of researchers have uncovered 25 security vulnerabilities in various supervisory control and data acquisition (SCADA) and industrial control system (ICS) protocols. A trio of researchers have ...
Actions to Take Today to Protect ICS/SCADA Devices: • Enforce multifactor authentication for all remote access to ICS networks and devices whenever possible. • Change all passwords to ICS/SCADA ...
Army Cyber Command has listed ICS-SCADA systems as one of five cyber defense priorities. (Maj. Ray McCulloch/Army) The Department of Defense’s cyber teams have typically defended IP-based networks, ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) yesterday released this ...
As utilities get smarter and more connected, the threat landscape for energy systems becomes vaster and more dangerous than ever before. A layered defense should consist of a combination of security ...
Most people have heard that one way law enforcement can figure out who might be growing marijuana in their basement is to monitor power consumption. If a small house is sucking up as much electricity ...