Submitted by Heather MacKenzie on Mon, 2015-01-26 06:27
Submitted by Heather MacKenzie on Wed, 2015-01-21 05:38
This blog is the last one from me as a member of the company that manufactures and sells Tofino Security products. Joann Byres (Tofino co-founder and Belden Vice President) and I are retiring from the Tofino Security group at Belden effective January 30, 2015.
Submitted by Heather MacKenzie on Fri, 2014-08-08 10:53
The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Since that shock, we have seen advanced malware, such as Flame and Duqu, target energy companies for espionage purposes.
Submitted by Eric Byres on Fri, 2013-05-03 16:38
Submitted by Eric Byres on Thu, 2013-04-04 16:17
Submitted by Eric Byres on Tue, 2013-03-26 12:11
In my last blog, I discussed the reasons why critical industrial infrastructure control systems are so vulnerable to attacks from security researchers and hackers, and explained why patching for such systems is not a workable solution.
Submitted by Eric Byres on Thu, 2013-03-14 16:40
As regular readers of this blog know, after Stuxnet, security researchers and hackers on the prowl for new targets to exploit shifted their efforts to critical industrial infrastructure.
Unfortunately, the Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) applications they are now focusing on are sitting ducks.
Submitted by Eric Byres on Thu, 2013-03-07 15:25
Last week I received am email (shown further down on this page) purporting to be from the US Internal Revenue Service (IRS).

Submitted by Eric Byres on Mon, 2013-01-28 21:00
January is the Cruelest Month
Submitted by Laura Mattson on Wed, 2012-12-12 12:28
Early in 2012 Eric Byres wrote a blog article predicting what he thought would happen in 2012 with regards to SCADA and ICS security. I went back to his blog and highlighted the four main predictions he made. Then I asked him to rate himself on each one.
Submitted by S. Claus on Tue, 2012-11-27 10:15
Submitted by Joann Byres on Tue, 2012-11-20 11:29
Submitted by Eric Byres on Wed, 2012-11-14 10:45
“Lacking extravagant IT budgets, automation systems also require cyber security systems that just work, with a minimum of human intervention.”
Submitted by Eric Byres on Thu, 2012-11-08 10:28
Who is responsible for fixing the thousands (some say 100,000) of vulnerabilities that exist in PLCs, DCS, RTUs and other automation devices that are in use in facilities around the world?
On the one hand, we have the position of Dale Peterson at Digital Bond. Dale ardently argues for (and takes) aggressive measures to pressure ICS vendors into making their products more secure. Through their 2012 Project Basecamp and subsequent disclosures, Digital Bond publically released vulnerability details for a large number of controllers.
Submitted by Eric Byres on Tue, 2012-11-06 11:12
In last week's blog, Heather wrote an excellent summary of Mark Cooksley's network security presentation regarding "Why Industrial Networks are Different than IT Networks". In it she noted that the number one goal of ICS security is based on the concern for safety. This is spot-on in my opinion. However, there is more to consider when it comes to industrial security priorities…
Submitted by Heather MacKenzie on Wed, 2012-10-31 14:07
Previously we looked at the question of “Why are PLCs so insecure?” Today we are going to come at SCADA security from another angle, which is “Why is securing Industrial Networks different than securing IT Networks?” We will also look at three ways to address these differences.
Submitted by Heather MacKenzie on Thu, 2012-10-25 21:00
Ed. Note: This is a significant update to an article first published on Sept 25, 2012. The original article is available as a download in Related Links.
Submitted by Eric Byres on Wed, 2012-10-17 13:23
Submitted by David Alexander on Wed, 2012-09-19 21:00
To understand the problems faced by SCADA users, the team at Regency IT Consulting wanted to build a basic test rig. The goal with the rig was to help us understand the users’ challenges and to interact with the technology and protocols.
Submitted by eschweigert on Wed, 2012-09-12 15:23
Last week Eric Byres addressed the difference between SCADA, ICS and other jargon in our industry. This week I am going to address a question I am often asked “Why are industrial networks so hard to secure?” This is a big topic, so today I will address only “Why are PLCs so Insecure?”
Pages