Controlling Interests Editors' Blog
Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance.
The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities.
BYOD security issues raise important questions core to cyber security.
Even after the disastrous 2010 BP oil spill, blowouts from underwater oil wells continue to pose a dangerous risk for drilling rigs.
Needing only tiny amounts of power, anisotropic magnetoresistive (AMR) sensor ICs can detect magnetic fields as weak as 7 Gauss.
A hacker helped authorities disrupt at least 300 cyberattacks.
Hackers are exploiting an Internet Explorer vulnerability that was recently left unpatched in Windows XP. Microsoft doesn't plan on doing anything about the problem.
A U.S. grand jury has indicted five Chinese for stealing industrial secrets via computer from U. S. companies
The ISA Cybersecurity Conference 2014, Detroit, June 9 - 12, 2014, will help help attendees learn how they can protect their industrial networks and controls systems against cyber threats.
Capital projects need to scale up and down quickly, making cloud-based project management solutions a good fit