All controlglobal.com Blogs
I was in Washington DC to be interviewed for an upcoming TV show on cyber security. We spent about an hour filming in front of two critical infrastructure sites. No one came out to see who we were or ask what we were doing. What if we were bad guys?
Safety systems are an important component of control systems and with the recent publication of the second edition of these documents so getting an understanding of some of the basic changes is certainly something that should be done.
The benefits from process control improvement originate from increases in process efficiency, flexibility, and capacity. Often, there is a tradeoff where an increase in flexibility or capacity is accompanied by a decrease in efficiency. Better measurements, process knowledge, online metrics, and an enhanced PID can provide a more intelligent and effective...
Many ICSs are connected to the Internet and it isn’t expensive to find them. ICSs continue to be connected to the Internet even though they may not be cyber secure. Be careful what you ask for - you just might get it.
Even after the disastrous 2010 BP oil spill, blowouts from underwater oil wells continue to pose a dangerous risk for drilling rigs.
To many in the IT community, the gap in understanding industrial control system cyber security is gaping. I was drawn to a May 29th Dark Reading article titled “Large Electric Utilities Earn High Security Scores as the title seemed to be at odds with what I have seen.
Needing only tiny amounts of power, anisotropic magnetoresistive (AMR) sensor ICs can detect magnetic fields as weak as 7 Gauss.
It’s official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta. As with previous ICS Cyber Security Conferences, the agenda will not be complete until shortly before the conference to accommodate the most...
A hacker helped authorities disrupt at least 300 cyberattacks.
There will now be the opportunity to turn loose a generation of hackers honing their control system hacking skills on video games. According to the videogame trailer, the game simulates more than 60 different hacks from your cell phone where you can manipulate traffic signals, cause blackouts, etc.