Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
In this second of two reports, we continue with a summary of the January 2006 BlackHat Federal Conference presentation by David Maynor, who was at that time an R&D research engineer for Internet ...
We’ve covered the troubles with SCADA security at length, but have yet to see a real consensus on how to proceed. Amol Sarwate, security research manager at Qualys, took a crack at making sense of ...
Computerized process-control systems run some of the most critical infrastructures in the U.S., such as power utilities, water treatment plants, chemical plants and mass-transit systems. Until ...