je.st
news
Tag: cyber
Cyber security: Are you NERC/CIP compliant?
2015-07-29 22:56:00| Transmission & Distribution World
New standards for critical infrastructure protection (CIP) have many utilities scrambling to comply. read more
Tags: security
cyber
compliant
cyber security
The cyber backseat driver: Car hackers
2015-07-29 05:32:19| Wireless - Topix.net
Remote, central control of gadgetry is the appeal of smart-home technology, but shoddy Wi-Fi and hackers are among potential pitfalls. Photo: Aleksey Boldin/Fotolia / McClatchy-Tribune News Service The idea of cyber hackers cracking wireless codes to control cars and trucks on the road may have once seemed like a scene out of a futuristic sci-fi flick.
Tags: car
driver
cyber
hackers
Insurance Study Uses U.S. Power Grid in Cyber Attack Scenario
2015-07-27 19:27:00| Transmission & Distribution World
Lloyds and the University of Cambridges Centre for Risk Studies have launched a new report: Business Blackout. read more
Tags: power
study
insurance
attack
FERC Eyes Development of Supply Chain Cyber Controls in New Reliability Standards
2015-07-22 21:41:00| Transmission & Distribution World
The Federal Energy Regulatory Commission acted last week to improve the cyber security of the bulk electric system by proposing revisions to critical infrastructure protection Reliability Standards read more
Tags: development
supply
eyes
standards
Universal Control System features embedded cyber security.
2015-07-17 14:31:06| Industrial Newsroom - All News for Today
Offering complete automation platform, Bedrock™ delivers I/O, power, and communications across pin-less electromagnetic backplane with parallel architecture that supports fast scan times regardless of I/O count. Removal of I/O pins increases cyber security while forming galvanic isolation barrier for I/O channels. Supporting 10 to thousands of I/O points, controller can run virtually any application independent of size or control task: discrete, batch, continuous, or multivariable control.
Tags: system
control
features
security
Sites : [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] next »