Trimark Associates has released True:SCADA, a reimagined control solution, engineered specifically for utility-scale PV and BESS resources.
Whenever a wintry cold front whips through metropolitan Pittsburgh, employees at Equitable Gas Co. go into action quietly behind the scenes. They click a few buttons on their computer screens to start ...
Renewable energy technology portfolios are becoming increasingly complex with multiple asset types like solar, wind and battery storage. SCADA systems can break down data silos, enable real-time grid ...
NEW YORK, Sept. 19, 2025 /PRNewswire/ -- According to a new comprehensive report from The Insight Partners, the global SCADA ...
The Internet of Things needs technology to connect people to machines and processes. From the operators on the plant floor to the execs in the C-suites, supervisory control and data acquisition (SCADA ...
HOUSTON, Jan. 8-- PetroChina Co. Ltd. has awarded two supervisory control and data acquisition (SCADA) system contracts to Calgary-based Metso Automation Inc., the automation and control technology ...
We’ve covered the troubles with SCADA security at length, but have yet to see a real consensus on how to proceed. Amol Sarwate, security research manager at Qualys, took a crack at making sense of ...
SCADA Controls--AEC showcased a SCADA control system, said to be capable of connecting any auxiliary or secondary machine that has serial communications capability. According to Ron Newlun AEC's ...
The City of Ephrata released an after-action review following a significant water leak incident that occurred Sept. 1. The ...
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines. During the spring, attackers ...
A joint cybersecurity advisory issued by CISA, NSA, FBI, and the Department of Energy (DOE) warns of government-backed hacking groups being able to hijack multiple industrial devices using a new ...
We know cyber-crooks love mobile phones to inject and infect you with malware to steal your money, but how about using a smartphone and SMS to steal a car? Last week I mentioned an upcoming Black Hat ...