JOIN US FOR OUR FALL VIRTUAL TRAINING WEEK EVENT OCTOBER 18 - 22 - REGISTRATION IS OPEN! Save Your Spot

Cybersecurity

Cybersecurity April 7, 2004

CRITICAL INFRASTRUCTURE PROTECTION GAO Report to Congressional Requesters (March 2004)

Testimony from the U.S. General Accounting Office(GAO)on the "Challenges and Efforts to Secure Control Systems". Securing control systems poses significant challenges including united specialized security technologies and lack of economic justification. Read the report from GAO here.

By Control Engineering Staff
Cybersecurity January 1, 2004

Monitors logs, performance at network layer

Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.

By Staff
Cybersecurity September 1, 2003

How to put SCADA on the Internet

Many companies are considering using the Internet for supervisory control and data acquisition (SCADA) to provide access to real-time data display, alarming, trending, and reporting from remote equipment. However, there are three significant problems to overcome when implementing an Internet-based SCADA system.

By Donald Wallace
Cybersecurity May 9, 2002

Intermec and Funk Software provide 802.1x wireless security

Las Vegas, Nev. - Intermec announced on May 6 at NetWorld+Interop 2002 a partnership with Funk Software (Cambridge, Mass.) that will provide 802.1x wireless security for Intermec 802.11 MobileLAN wireless systems.

By Control Engineering Staff
Cybersecurity June 1, 2000

Viruses: No one is immune

A computer virus is a self-replicating program designed to wreak havoc with computers. Some of them are benign, but mostly they're no laughing matter. For example, the "Love Bug" virus, which appeared in early May, affected businesses and government agencies throughout the world. Many companies, large and small alike, had to shut down their computer systems to handle the attack, causing g...

By Laura Zurawski, Web Editor
Cybersecurity January 1, 1970

Securing software

Chicago, Ill.—Software security is based on how applications and operating systems are constructed, but security also involves plant procedures, building security, and employee education, among other things, according to key software vendors at National Manufacturing Week, March 3-5, here. Proper software security measures are "very scarcely implemented," according to Dirk Rouffaer, Schne...

By Mark T. Hoske, editor-in-chief, mhoske@cahners.com