By saying, in February 2003, that the protection of control systems had become "a national priority," President Bush set off a flurry of security activities in the industrial sector. We remain, however, a long way from reaching the goal of secure industrial infrastructures. So that an appropriate layer of security can be added, most of the past few years' security efforts have been spent simply...
Pittsburgh, PA—More than a dozen companies, including Eaton Corp., met earlier this year with the National Electrical Manufacturers Association's (NEMA) Anti-Counterfeiting Committee to address the growing installation of unauthorized electrical aftermarket products that jeopardize personnel safety and the integrity and code compliance of electrical distribution systems worldwide.
Washington, D.C.; London, Ontario, Canada—Danaher Corp. has agreed to acquire all shares of Trojan Technologies Inc. for approximately $185 million in cash, including transaction costs and net of cash acquired.
Protecting people and equipment from "arc flash" will be the theme of Plant Engineering magazine's latest Webcast on Sept. 30, 2004. This online event will address: electrical documentation accuracy; protection devices available to increase worker and equipment safety; and knowledge required to make all these pieces fit together.
Many users of personal data assistants (PDAs) store sensitive data on devices that have no security protection, a new survey shows.
The U.S. General Accounting Office recently reported that, besides increasing general cyber threats, several factors are contributing to escalated risks of cyber attacks against control systems. These factors include adoption of standardized technologies with known vulnerabilities and increased connectivity of control systems to other systems, according to GAO's report, "
Testimony from the U.S. General Accounting Office(GAO)on the "Challenges and Efforts to Secure Control Systems". Securing control systems poses significant challenges including united specialized security technologies and lack of economic justification. Read the report from GAO here.
Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.
Many companies are considering using the Internet for supervisory control and data acquisition (SCADA) to provide access to real-time data display, alarming, trending, and reporting from remote equipment. However, there are three significant problems to overcome when implementing an Internet-based SCADA system.
Las Vegas, Nev. - Intermec announced on May 6 at NetWorld+Interop 2002 a partnership with Funk Software (Cambridge, Mass.) that will provide 802.1x wireless security for Intermec 802.11 MobileLAN wireless systems.