Historically, automation systems have relied on “security through obscurity“ to avoid computer attacks. Those days are gone. While the number of actual attacks on automation systems has been small, the tools needed to conduct these attacks...

read more