Published: December 2016
Unidirectional technology is mentioned multiple times in the context of technology that provides security for insecure protocols, and as a recommended practice in SCADA security to reinforce security system. Read more.
Published: November 2016
Appropriately, the guide recognizes the current legacy systems and services, unauthenticated data sources and industrial control systems found in most global airports as insecure foundation of airport operations centers. To protect against the ensuing vulnerabilities which come from the aforementioned problems, unidirectional technology is listed as key technical control. Read more.
Published: September 2016
Published: February 2016
Rail systems are becoming more vulnerable to cyber attack due to the integration of open-platform systems, equipment using COTS components and increased prevalence of control and automation systems that can be accessed remotely via public and private networks. Read more.
Published: December 2015
Published: July 2014
Data traffic zone boundaries should be handled with additional restriction and should also be monitored and logged. For certain types of IT environments, it may be useful to use unidirectional technology. Read more.