The Cybersecurity and Infrastructure Security Agency wants to work with partners from government and the private sector to secure industrial control systems as the agency enters its second year.
There is no question that each generation of technology is different from the last. In this sense, many would think that ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. Industrial control systems are often some ...
It’s long been known that a reactive approach to industrial control system maintenance is not an ideal strategy. Working from a reactive stance, in which problems are corrected as they occur, results ...
At the end of February, PICMG (PCI Industrial Computer Manufacturers Group)—the consortium for open hardware specifications—introduced InterEdge, a modular architecture for process control systems ...
In an RL-based control system, the turbine (or wind farm) controller is realized as an agent that observes the state of the ...
Back in 1982, the CIA uncovered a plot by the Soviet Union to steal industrial software for controlling its rapidly expanding network of natural-gas pipelines. In response, the agency modified the ...
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? A recent incident where a likely nation-state threat ...