Blogs

BYOD: 10 Tips Enterprises Can Use to Protect Their Data

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient.

Tofino Security article: SCADA Cyber Security Problems

SCADA Cyber Security Problems - Just How Common are the Programming Errors?

ACS 2011 Conference Summary - September 21

The final agenda can be found at www.realtimeacs.com There are several unique hallmarks of the conference:

Cyber Threat to Control Systems: Are Companies Expecting Too Much Info?

The industry uses the general term "threat information," but during more detailed discussions, it seems that the information companies seek is more like the traditional military concept of "tactical information."

Future of Instrumentation Workshop

Oakridge National Laboratory is hosting the above workshop November 8 – 10 at their facilities in Oakridge Tennessee with the intent of focusing on the Future of Instrumentation.

More on Stuxnet and a New SCADA Security Blog

This popped up in my email box this morning. It's a note from Eric Byres at Tofino. Eric is a well-known security expert and a sometime contributor to Control. "With announcement on Tuesday of the Microsoft patch for the Stuxnet vulnerability, we have updated our recommendations for addressing this critical...

Leadership Focus Podcast: Cyber Security

Each year the damage to critical infrastructure from network incidentsand cyber attacks is measured in the billions of dollars.

Another Plant Safety Issue

If you've been paying attention today, you already know that big news here in the Midwest, besides the snow, is the shooting at the ABB plant in St. Louis. The story is still developing, as we say in the press, and it's dangerous to draw any kind of hard-and-fast...

Fighting the Last War--Airport Kabuki and Functional Security

In his blog "What do 9/11, the Detroit bomber and ICS Security have in Common," Joe Weiss makes some really good points.

Let's Get Started

Here we go, the most challenging of all steps is the first one so I will start safe (baby steps concept) by sharing with you the topics I hope to cover in this blog: