understanding of the engineering interactions of complex automation and control systems," he said, "in which cyber vulnerabilities exploited in sectors such as energy production and distribution, water treatment, refining, and chemicals, can
released a guidance to give water utility managers a concise set of best practices and standards for reducing their cyber vulnerabilities . It outlines a transparent and repeatable process for evaluating a utility's process control system. "Our
network security solutions provider, for the deployment of an electronic security perimeter to mitigate external cyber vulnerabilities . The water utilities system is one of the largest water service providers in the southeastern United States
Association (AWWA) announced the release of expert guidance on how water and wastewater utilities can reduce their cyber vulnerabilities , in light of growing cyber-attacks that pose a threat to critical infrastructure systems. This guidance
and critical infrastructure in recognition of the interrelated nature of industrial computer networks in which cyber vulnerabilities exploited in one sector can impact multiple sectors and infrastructure. "The new standard represents a collaborative
Technologies provides proactive technology solutions designed to identify the presence of, and mitigate against, cyber vulnerabilities that can impact safe, secure and reliable industrial operations. Wurldtech's product portfolio is designed
byte-by-byte communications activity on an individual line. SCADAsafe TM / Modem Defender TM addresses major cyber vulnerabilities by creating an “electronic security perimeter” around a SCADA/Control System. Features include 2048
KEMA Conference, held in cooperation with U.S. DOE and Sandia National Laboratories, addresses solutions to infrastructure cyber vulnerabilities , Aug. 16-18, in Idaho Falls...