Cybersecurity

Cybersecurity June 13, 2011

Best Practices: Propane-fueled forklifts deliver savings, performance

Propane-fueled forklifts maintain consistent, 100% power throughout operation, reduce greenhouse gas emissions, and have a well-established fuel delivery and cylinder exchange structure.

By Brian Feehan, vice president, Propane Education and Research Council
Cybersecurity June 3, 2011

Recurring Monthly Revenues (RMR) a key topic at PSA-Tec

For many of the integrators attending the show, the RMR model helps with financial and strategic planning, making it easier to forecast growth and identify areas and regions that need extra resource. It can also be appealing to investors who appreciate the security of this future revenue source and can offer some resilience to shorter-term economic problems.

By Ewan Lamont, Analyst, Security Services, IMS Research
Cybersecurity May 6, 2011

Will cloud concerns impact VSaaS?

With a well-established cloud based service experiencing difficulty and a global technology brand’s IT system hacked; does this raise concerns about the current trend towards cloud-based physical security?

By William Rhodes, Analyst, Video Surveillance and VCA, IMS Research
Cybersecurity April 26, 2011

Water utility suffers cyber incident

A water utility reported a cyber incident when remote users experienced difficulties logging into the control systems, according to an ICS-CERT report.

By Gregory Hale; Source: ISS Source
Cybersecurity April 25, 2011

NSA chief: Grid ripe for attack

Electric companies in the United States might not be able to protect the power grid in the United States from a cyber attack, said the director of the National Security Agency (NSA).

By Source: ISS Source
Cybersecurity April 25, 2011

Secure OPC keeps attackers at bay

Automation systems remain vulnerable and exposed. Past experiences like Stuxnet and last month’s revelations about SCADA system vulnerabilities show networks are sitting ducks to any aggressive and sophisticated attack.

By Source: ISS Source
Cybersecurity April 19, 2011

Introducing the IMS Research security blog

The purpose of this blog is provide manufacturers, systems integrators, distributors, investors and other interested parties with regular "snapshot" market statistics and analyst opinions.

By Niall Jenkins, Research Manager, Video Surveillance and VCA, IMS Research
Cybersecurity March 24, 2011

Malware report: Learn from past attacks

Stuxnet was the biggest and most noteworthy attack on the industrial control environment, but it was not the biggest in terms of documented and investigated malware incidents

Cybersecurity March 24, 2011

Hackers get hacked

Even hackers face problems with hackers.

Cybersecurity March 24, 2011

Stuxnet report III: Worm selects site

Now it is time to turn the table and ask “How might this target protect itself from a worm like Stuxnet?”