Testimony from the U.S. General Accounting Office(GAO)on the "Challenges and Efforts to Secure Control Systems". Securing control systems poses significant challenges including united specialized security technologies and lack of economic justification. Read the report from GAO here.
Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.
Many companies are considering using the Internet for supervisory control and data acquisition (SCADA) to provide access to real-time data display, alarming, trending, and reporting from remote equipment. However, there are three significant problems to overcome when implementing an Internet-based SCADA system.
Las Vegas, Nev. - Intermec announced on May 6 at NetWorld+Interop 2002 a partnership with Funk Software (Cambridge, Mass.) that will provide 802.1x wireless security for Intermec 802.11 MobileLAN wireless systems.
A computer virus is a self-replicating program designed to wreak havoc with computers. Some of them are benign, but mostly they're no laughing matter. For example, the "Love Bug" virus, which appeared in early May, affected businesses and government agencies throughout the world. Many companies, large and small alike, had to shut down their computer systems to handle the attack, causing g...
Chicago, Ill.—Software security is based on how applications and operating systems are constructed, but security also involves plant procedures, building security, and employee education, among other things, according to key software vendors at National Manufacturing Week, March 3-5, here. Proper software security measures are "very scarcely implemented," according to Dirk Rouffaer, Schne...