Until recently, almost all of the hacking demonstrations were performed by the national laboratories implicitly indicating that vulnerabilities took a "rocket scientist" to understand and demonstrate. Lately, there have been a number of control system hacking demonstrations from commercial/vulnerability researchers. At the ACS Conference on the 20th, we will have a vulnerability researcher hack AMI infrastructure. We will also have an end-user demonstrate how easy it is to create a broadcast storm affecting legacy field control equipment which has ALREADY shutdown a nuclear plant and a number of process facilities.
Joe Weiss
Carbon dioxide is increasingly recognized as a vital resource with significant economic potential. While the conversion of carbon dioxide into products is still in its infancy...
Discover our wide range of temperature transmitters that convert sensor signals from RTDs and thermocouples into stable and standardized output signals!
An innovative amine absorption-based carbon capture process enables retrofitting of existing industrial facilities to reduce emissions in hard-to-abate sectors, with advanced ...