SCADAhacker

SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Con
SCADAhacker

SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Con
Rating
0.0 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Industrial Control System Security
Product Description
SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS) in a variety of public and social media forums.
Since its launch in December 2011, SCADAhacker has attracted and retained over 10,000 readers and followers from over 50 countries around the world, making it one of the leading sources for information sharing and knowledge development specifically devoted to industrial security.
The idea is simple - provide a single point of contact for a wide range of readers covering multiple industry segments for everything related to industrial security.
Contact Vendor
Interested in SCADAhacker? Get in touch with the vendor.
arrow_upwardPOPULAR
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Abilene Advisors Supplier Shield
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
Analyst1 Orchestrated Threat Intelligence Platform
Analyst1 Orchestrated Threat Intelligence Platform on SecurityListing: Orchestrated threat intelligence platform for CTI and SOC teams
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a