The potential for remotely turning reactors into weapons is independent of their country of origin.
From tips to avoid common PID tuning mistakes and the latest in wireless, to Forbes '30 and 30' list, these were the most-read articles on ControlGlobal.com this month.
From on-site coverage of TechED and new developments from ExxonMobil, to the latest in valve flow and reciprocating compressors, these were the most-read stories in 2016.
Neal Hirschfield, deputy director of ICS-CERT, part of the U.S. Dept. of Homeland Security, notes an 'ongoing series of low- to moderate-level cyber-attacks that will impose cumulative costs on U.S. economic competitiveness and national security.'
White Papers: In Depth Research
Posted: Apr 06, 2015
A good cybersecurity policy, however, is a simple first step to maintaining the reliability and the safety of substation and grid operations.
Posted: Apr 01, 2015
Harnessing the Power of Change. From IoT and cybersecurity to robotics and managing change, here's the best conference content .
Posted: Mar 11, 2015
This white paper analyzes the Dragonfly cyber campaign, looking at its targets, its methods of attack, its impact and what it means for defending operations from similar attacks in the future.
Posted: Mar 26, 2014
How are other IT security practitioners thinking differently about cyberthreats and their defenses, and should we adjust our perspective and plans to account for these differences?