Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient.
SCADA Cyber Security Problems - Just How Common are the Programming Errors?
The final agenda can be found at www.realtimeacs.com There are several unique hallmarks of the conference:
The industry uses the general term "threat information," but during more detailed discussions, it seems that the information companies seek is more like the traditional military concept of "tactical information."
Oakridge National Laboratory is hosting the above workshop November 8 – 10 at their facilities in Oakridge Tennessee with the intent of focusing on the Future of Instrumentation.
This popped up in my email box this morning. It's a note from Eric Byres at Tofino. Eric is a well-known security expert and a sometime contributor to Control. "With announcement on Tuesday of the Microsoft patch for the Stuxnet vulnerability, we have updated our recommendations for addressing this critical...
Each year the damage to critical infrastructure from network incidentsand cyber attacks is measured in the billions of dollars.
If you've been paying attention today, you already know that big news here in the Midwest, besides the snow, is the shooting at the ABB plant in St. Louis. The story is still developing, as we say in the press, and it's dangerous to draw any kind of hard-and-fast...
In his blog "What do 9/11, the Detroit bomber and ICS Security have in Common," Joe Weiss makes some really good points.
Here we go, the most challenging of all steps is the first one so I will start safe (baby steps concept) by sharing with you the topics I hope to cover in this blog: