Home cyber
 

Keywords :   


Tag: cyber

Cyber security: Are you NERC/CIP compliant?

2015-07-29 22:56:00| Transmission & Distribution World

New standards for critical infrastructure protection (CIP) have many utilities scrambling to comply. read more

Tags: security cyber compliant cyber security

 

The cyber backseat driver: Car hackers

2015-07-29 05:32:19| Wireless - Topix.net

Remote, central control of gadgetry is the appeal of smart-home technology, but shoddy Wi-Fi and hackers are among potential pitfalls. Photo: Aleksey Boldin/Fotolia / McClatchy-Tribune News Service The idea of cyber hackers cracking wireless codes to control cars and trucks on the road may have once seemed like a scene out of a futuristic sci-fi flick.

Tags: car driver cyber hackers

 
 

Insurance Study Uses U.S. Power Grid in Cyber Attack Scenario

2015-07-27 19:27:00| Transmission & Distribution World

Lloyds and the University of Cambridges Centre for Risk Studies have launched a new report: Business Blackout. read more

Tags: power study insurance attack

 

FERC Eyes Development of Supply Chain Cyber Controls in New Reliability Standards

2015-07-22 21:41:00| Transmission & Distribution World

The Federal Energy Regulatory Commission acted last week to improve the cyber security of the bulk electric system by proposing revisions to critical infrastructure protection Reliability Standards read more

Tags: development supply eyes standards

 

Universal Control System features embedded cyber security.

2015-07-17 14:31:06| Industrial Newsroom - All News for Today

Offering complete automation platform, Bedrock™ delivers I/O, power, and communications across pin-less electromagnetic backplane with parallel architecture that supports fast scan times regardless of I/O count. Removal of I/O pins increases cyber security while forming galvanic isolation barrier for I/O channels. Supporting 10 to thousands of I/O points, controller can run virtually any application independent of size or control task: discrete, batch, continuous, or multivariable control.

Tags: system control features security

 

Sites : [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] next »