A defense-in-depth architecture built around a dual-data model reduces the risk of supervisory control and data acquisition networks being hacked or their data being stolen. The dual-data approach ...
In a slide presentation from the January 2006 BlackHat Federal Conference, David Maynor, was who was at that time an R&D research engineer for Internet Systems Security (ISS) X-Force and colleague ...
Most security operations people I’ve spoken with at electrical utilities have a good handle on the security vulnerabilities within their own SCADA environments. Their problem is convincing their ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results