Your one-stop web resource providing safety and security information to manufacturers

Search Results

You searched for: night dragon

Attacking an ICS from ‘Inside Out’

A hardened perimeter used to be the way to ensure a secure network, but the new approach protects in an opposite manner, which is from the inside out. Understanding a bad guy – whether it is external or internal – can break into a network if that is wh …

Enabling Business Through Safety, Security

By Gregory Hale An oil platform stood silently awash in the Gulf of Mexico waves a short time ago and unbeknownst to workers on the rig and others onshore, malware was on board turning that facility into a potential floating time bomb. Malware, downloa …

PoS Means Manufacturers Remain Vigilant

By Gregory Hale It wasn’t too long ago when industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were in the scope of the bad guys. These systems, sometimes close to 30 years old and considered easy pickings, we …

Science Fiction Becomes Reality

By Eric Knapp In films, cyber incidents have long been able to cross the divide from the digital to the physical. We’ve seen fictional code destroy everything from top-secret government facilities to invading alien spaceships. We’ve seen criminals rans …

Securing Real-Time Drilling Data

By Gregory Hale There is no better term around today that sums up the requirements for oil and gas drillers than two simple words: Real time. With millions, if not billions, of dollars at stake, there is no fooling around. The easy days of oil and gas …

PNNL Attacked; Web Site Shut Down

Pacific Northwest National Laboratory (PNNL) was the target of a highly sophisticated cyber attack which forced the lab to shut down its web site and block incoming email, officials said. As a precaution, employees of the Department of Energy national …

Pin It on Pinterest