VPNs
VPN sessions tunnel across a transport network in an encapsulated format, making them “invisible” to devices that don’t have access to the VPN members’ secret “keys” or “certificates”.
Application Notes
Articles
- Forget the Silos, Build the Bridge
- The IT Department - Friend or Foe?
- SCADA Security: New Standards Protecting Old Technology
- Wolves at the Door(s) of the House of Straw
- Network Threats
- Network Secures Process Control
Blog Posts
- Using ANSI/ISA-99 Standards for SCADA Security (plus White Paper)
- Getting Started on ICS and SCADA Security (Part 2 of 2)
- Controlling Stuxnet – No More Flat Networks PLEASE. Let's Embrace "Security Zones".
- Jeff Smith’s Practical SCADA Security
- Speak Up NOW on New IF-MAP Specs for ICS and SCADA Security
- IF-MAP: A New Standard for SCADA Security that You Should Know About
- Password Reuse – Control Networks Double the Risk
- Not your Father's Control System