Nancy Bartels driving the blogging machine here this morning. I am not by nature an alarmist, and I tend to ignore headlines that say (or imply) "OMG, we're all going to die!" On the other hand, when you smell smoke in the kitchen for longer than a couple of minutes,...
The SCADA in the Cloud webinar will highlight the importance of Cloud-based applications within the industry. Attendees will also learn how some end user companies have used Cloud-based SCADA to surge ahead in their field.
My blog on the Illinois water hack was directly based on a formal disclosure announcement by the Illinois State Terrorism and Intelligence Center - STIC (Note: My blog did not identify the state involved. That disclosure came from DHS).
IDC is preparing a conference event in Brisbane, Australia March 21-22, 2012 that promises an opportunity to network with your peers and learn more about the latest happenings in this exciting and growing field.
SCADA Cyber Security Problems - Just How Common are the Programming Errors?
Virginia Tech runs one of the few production scale IPv6 networks in the United States, with a network of more than 30,000 computing and communication systems. As owners of a system this size and the range of Users involved security is obviously an issue.
According to the Channel Insider blog, Microsoft has released an out-of-band patch (MS10-046) that attempts to repair the .LNK vulnerability that has been used to attack Siemens S7, PCS7 and WinCC-based HMI systems.
From the press release from AFCON Software and Electronics:
Here we go, the most challenging of all steps is the first one so I will start safe (baby steps concept) by sharing with you the topics I hope to cover in this blog:
Allie Herzog from Blog Talk Radio talks SCADA with CONTROL magazine's Editor-In-Chief, Walt Boyes. Hear what he has to say.