ICS/SCADA
- 12 juillet 2014Ninety-six percent of enterprises think they know what targeted attack campaigns are. But studies show that more than half can't even differentiate between traditional threats and actual attacks. How far is enterprise perception on their targeted attack pr
- 02 juillet 2013A rundown of basic configuration considerations that can improve ICS/SCADA systems security
- 15 mars 2013This research paper illustrates who¡¯s really attacking Internet-facing ICS/SCADA systems and why. It also covers techniques to secure ICS/SCADA systems and some best practices to do so.
- 02 juillet 2012ICS environments share a common fate ¡ª- they are not ¡°traditional¡± IT network environments and should not be treated as such.
- 07 mai 2008Due to operational "optimization", the SCADA threat landscape now begins to look a lot like the network security landscape that we all know and respect ¡ª one of constant vigilance and constant defensive threat posture.
- 18 janvier 2008Why SCADA systems should never be connected in any way, shape, or form to the public Internet, and how business decisions over the course of the past 15 years have allowed the "public" and "private" networks to become dangerously close in p