Cybersecurity

Cybersecurity February 1, 2005

Security: a national priority

By saying, in February 2003, that the protection of control systems had become "a national priority," President Bush set off a flurry of security activities in the industrial sector. We remain, however, a long way from reaching the goal of secure industrial infrastructures. So that an appropriate layer of security can be added, most of the past few years' security efforts have been spent simply...

By David Greenfield, Editorial Director
Cybersecurity September 30, 2004

Eaton aids coalition to stop counterfeit electrical products

Pittsburgh, PA—More than a dozen companies, including Eaton Corp., met earlier this year with the National Electrical Manufacturers Association's (NEMA) Anti-Counterfeiting Committee to address the growing installation of unauthorized electrical aftermarket products that jeopardize personnel safety and the integrity and code compliance of electrical distribution systems worldwide.

By Control Engineering Staff
Cybersecurity September 29, 2004

Danaher offers to buy Trojan Technologies

Washington, D.C.; London, Ontario, Canada—Danaher Corp. has agreed to acquire all shares of Trojan Technologies Inc. for approximately $185 million in cash, including transaction costs and net of cash acquired.

By Control Engineering Staff
Cybersecurity September 1, 2004

Plant Engineering to present Arc Flash II Webcast

Protecting people and equipment from "arc flash" will be the theme of Plant Engineering magazine's latest Webcast on Sept. 30, 2004. This online event will address: electrical documentation accuracy; protection devices available to increase worker and equipment safety; and knowledge required to make all these pieces fit together.

By Staff
Cybersecurity May 13, 2004

Many use PDAs with no security protection

Many users of personal data assistants (PDAs) store sensitive data on devices that have no security protection, a new survey shows.

By Control Engineering Staff
Cybersecurity May 1, 2004

U.S. GAO says control systems at risk of cyber attacks

The U.S. General Accounting Office recently reported that, besides increasing general cyber threats, several factors are contributing to escalated risks of cyber attacks against control systems. These factors include adoption of standardized technologies with known vulnerabilities and increased connectivity of control systems to other systems, according to GAO's report, "

By Staff
Cybersecurity April 7, 2004

CRITICAL INFRASTRUCTURE PROTECTION GAO Report to Congressional Requesters (March 2004)

Testimony from the U.S. General Accounting Office(GAO)on the "Challenges and Efforts to Secure Control Systems". Securing control systems poses significant challenges including united specialized security technologies and lack of economic justification. Read the report from GAO here.

By Control Engineering Staff
Cybersecurity January 1, 2004

Monitors logs, performance at network layer

Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.

By Staff
Cybersecurity September 1, 2003

How to put SCADA on the Internet

Many companies are considering using the Internet for supervisory control and data acquisition (SCADA) to provide access to real-time data display, alarming, trending, and reporting from remote equipment. However, there are three significant problems to overcome when implementing an Internet-based SCADA system.

By Donald Wallace
Cybersecurity May 9, 2002

Intermec and Funk Software provide 802.1x wireless security

Las Vegas, Nev. - Intermec announced on May 6 at NetWorld+Interop 2002 a partnership with Funk Software (Cambridge, Mass.) that will provide 802.1x wireless security for Intermec 802.11 MobileLAN wireless systems.

By Control Engineering Staff