Archive | Cybersecurity

Stuxnet on 60 Minutes

We have been discussing Stuxnet since it was discovered in 2010.  Stuxnet was recently profiled on CBS’ 60 Minutes.  There are some of the exclusive video clips that were posted on 60 Minutes Overtime web site. Nancy Bartels, Managing Editor at Control Global, had some comments about the show which she posted here on Control Global’s […]

Continue Reading · 0
security hand on keyboard

Uninterruptible Power Supply Technology and Cybersecurity

The recent number of cyber-attacks and their level of sophistication have demonstrated the inadequate network security measures employed by many large corporations, government, and military agencies. Time is on the hackers’ side. They only have to find one unsecure computer or device on a segment of a corporate or governmental network, and they can use […]

Continue Reading · 0

Security standards committee completes ballot

The ISA99 committee recently completed a ballot on the standard, ISA-62443.03.03 (99.03.03), Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels. Closing on October 27, 2011, the ballot passed with 18 approval votes and five disapproval votes. Reflecting the widespread interest in the draft, more than 500 comments were received […]

Continue Reading · 0

ISA99 issues security draft for committee ballot

ISA99, Security for Industrial Automation and Control Systems, has issued a draft standard for committee ballot. ISA-62443.03.03 (99.03.03): Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels, prescribes the system security requirements related to seven foundational requirements defined in ISA-99.01.01-2007 and assigns system security assurance levels to the system under […]

Continue Reading · 0

Power in Security

The power industry has a white elephant in the room — the NERC and CIP regulatory requirements for all the power fossil hydro transmission distribution within the U.S. and North America in general. So says Bryan Singer of Kenexis Security Corp. while gleening input from power industry gurus at the latest POWID Symposium this past […]

Continue Reading · 0

FTPW: Security Certification Double Whammy

For our fifth and final day of ISA Interchange’s “Free Tech Paper Week”, we’re bringing you a two-for-one. You’ll get another presentation, this one presented by Dr. Ragnar Scheirholz and Kevin McGrath at ISA Automation Week 2010, but you’ll also get a copy of their full technical paper as well. Read below for the full […]

Continue Reading · 0
In a SCADA system, a primary control center may be interconnected with a variety of remote locations as well as the corporate IT network.

Process Control Network Security Connectivity Simplified

The susceptibility of control systems to security issues continues to confront organizations. While it may be rare to penetrate a control system directly from the Internet, corporate connections, remote support links, USB keys, and laptops create pathways for the typical worm or advanced hacker. Once inside, attacking an industrial control system is not difficult—in some […]

Continue Reading · 0

Pin It on Pinterest