Hexagon’s Asset Lifecycle Intelligence division has entered into a partnership with New Zealand-based Scada Systems, Ltd., the provider of industrial solutions for power generation...
Water utility operators around the world are under continuous pressure to operate efficiently, conserve water, reduce their environmental impact, and maintain a high level...
AWS EOT, a specialist in software for energy, manufacturing and the Industrial Internet of Things (IIoT), has been working with Amazon Web Services (AWS)...
Amidst the perpetual and turbulent innovation and adoption of tech-oriented ecosystems by the world, the looming threats are overshadowing them at a much faster and smatter pace. It is not a topic of discussion anymore how much tech-dependent the whole world has become, however, it certainly begs other branches for discourse; cyber threats, hacking, ransom […]
As many as seven security vulnerabilities have been disclosed in PTC's Axeda software that could be weaponized to gain unauthorized access to medical and IoT devices.
Collectively called "Access:7," the weaknesses – three of which are rated Critical in severity – potentially affect more than 150 device models spanning over 100 different manufacturers, posing a significant supply chain risk.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week released an advisory to inform organizations about potentially serious vulnerabilities affecting ipDIO telecontrol communication devices that are no longer supported by the vendor.
Kaspersky said it saw only a small increase in the percentage of industrial control system (ICS) computers targeted in 2021 compared to the previous year, but there was a more significant rise for certain types of threats.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week published an industrial control system (ICS) advisory related to multiple vulnerabilities impacting Schneider Electric's Easergy medium voltage protection relays. "Successful exploitation of these vulnerabilities may disclose device credentials, cause a denial-of-service condition, device reboot, or allow an attacker to
LAKE TAHOE, Nev.–(BUSINESS WIRE)–iMatrix Systems today announced that the company has emerged from stealth with an initial round of angel ... Read More