DHS Warns Thousands of Industrial Energy Systems Vulnerable to Remote Hacking
The Web interface to an Internet-connected device used by power-generation plants can be easily exploited, a DHS advisory states.
The Web interface to an Internet-connected device used by power-generation plants can be easily exploited, a DHS advisory states.
The weakest link in most security systems is the user. Use these tips to make sure hackers don’t use them against you.
Global cybersecurity certification and education membership body aims to help advance the automation of cyber insurance decisions through new partnership.
The event will be held June 6 in Washington, D.C., featuring speakers from the federal government and other institutions.
A pair of industry- and integrator-focused presentations highlighted this year’s PSA-TEC event, where participants spoke to the fallout from the recent M&A activity, subscription-based security and much more.
Budgeting to protect your customer’s sensitive information from a data breach only makes good business sense.
Computer scientists have discovered vulnerabilities in Samsung’s smart home automation system that allowed them to carry out a host of remote attacks.
With computer hacking and other persistent threats on the rise, the North American managed security services market is forecast to be $26.9 billion in 2020
Four integrators explain what specialized design, installation and service needs this challenging sector requires.
More and more security devices are being placed on networks and therefore need to tested and designed to withstand hacking attacks. Learn what to be aware of, look for and verify in a vendor.