Beef up your plant network security--the sooner the better!

October 2003
Control Solutions International;Oct2003, Vol. 76 Issue 10, p25
Interviews Brian Ahern, president and CEO of Verano, on security monitoring of computer systems. Steps to insure that a plant floor control will not receive computer viruses; Suggestions on improving the protection of the web browser connection; Features of UNIX-based operating systems.


Related Articles

  • VERANO INTRODUCES INDUSTRIAL DEFENDER GUARD.  // Computer Security Update;Aug2004, p1 

    Mansfield, Massachusetts-based Verano Inc., a provider of security solutions for mission-critical industrial operations, has introduced Industrial Defender Guard, the first perimeter protection appliance designed to provide control systems and networks with complete protection against cyber...

  • Core software as security vulnerabilities. Bradner, Scott // Network World;10/18/2004, Vol. 21 Issue 42, p22 

    This article discusses the SANS Institute's 2004 list of the 20 most critical Internet security vulnerabilities. The list includes 10 threats in Windows-based systems and 10 in Unix-based systems. The 10 Windows vulnerabilities are: Web servers and services, workstation service, Windows remote...

  • TIPS TO PROTECT YOUR OFFICE NETWORK.  // Inventors' Digest;Dec2009, Vol. 25 Issue 12, p24 

    The article offers tips for protecting office computer networks. A recommendation for protecting computer networks is to install both anti-virus and anti-spyware support. When using social networking Web sites, the author recommends conducting periodic searches. The author also recommends...

  • Microsoft: security now key issue in browser market.  // MarketWatch: Technology;November 2004, Vol. 3 Issue 11, p15 

    Focuses on how Microsoft Corp.'s rivals seem to have started capitalizing on a series of Internet Explorer (IE)-related security scares. Decline in the market share of Microsoft's IE browser; Features of the Mozilla Foundation's Firefox browser; German government official Michael Dickopf's...

  • Browser weakness compromises remote users. Saran, Cliff // Computer Weekly;3/9/2004, p16 

    If the Jericho Forum's deperimeterisation security model is to work, users and suppliers will have to tackle the problem of providing access to corporate networks from an increasingly wide range of devices. Currently, most business users connect securely to a corporate network via desktop PCs...

  • New breed of virus beats AV gateways. Saran, Cliff // Computer Weekly;11/16/2004, p1 

    This article reports that the creators of the Bofra worm, a variant of MyDoom, which was released last week, have devised a way to bypass antivirus gateway security, according to security company ClearSwift Corp. The virus uses the iFrame security hole in Internet Explorer. Microsoft has issued...

  • Google Issues Chrome Browser Fix. Mulroy, James // PCWorld;Aug2011, Vol. 29 Issue 8, p36 

    This article discusses the move of some computer companies to update security on their software. The Chrome browser has been updated by Google Inc. to address various computer bugs. Meanwhile, Apple Inc. altered the way the malicious-file quarantine system in Mac OS X functions to prevent...

  • Imposing Security. Garfinkel, Simson L. // MIT Technology Review;Jul/Aug2014, Vol. 117 Issue 4, p87 

    The article features three computer bugs that emerged in 2014, namely security bug Heartbleed that affected a program called OpenSSL, Go to Fail that infested Apple operating systems and CVE-2014-1776 that targeted Microsoft's Web browser Internet Explorer. Topics discussed include the...

  • Analysis. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);May/Jun2010, p11 

    The article reports that browser compromises shown at the 2010 Canadian security conference, CanSecWest, have increased fears that web-based threats are being underestimated.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics