Though most means of remote access to control systems use one-way flows of information from the system to the mobile device, the number of applications allowing some level of remote control are ...
Mobile applications used to help control internet-connected SCADA (industrial control and supervisory control and data acquisition) systems are riddled with security vulnerabilities which, if ...
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines. During the spring, attackers ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
Using simple, drag-and-drop technology, this plant floor solution doesn’t require an IT expert. Eric Byres, chief technology officer at Byres Security Inc., calls it “a VPN that people can actually ...
Is critical infrastructure any more secure than it was a year ago, or five years ago? Well according to three different reports from experts, it doesn’t seem like it. Instead, it seems like critical ...
This document provides guidance for establishing secure industrial control systems. These industrial control systems (ICS), which include supervisory control and data acquisition (SCADA) systems, ...
LOS ANGELES--(BUSINESS WIRE)--Cimon, Inc. – a global supplier of industrial automation products, including operator interface terminals (OIT), programmable logic controllers (PLCs) and supervisory ...
HD Electric Co.’s VarCom 2600 Communicating Capacitor Controls provide remote control from central Volt-VAR, CVR, DMS or SCADA systems and can control capacitor banks using combinations of ambient ...