Cybersecurity

Traffic signals are among the most popular targets of hacking in fiction. In a number of movies, TV shows and video games, traffic signals are…
May 08, 2019
Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications are emerging for next-generation vehicles in surface transportation…
December 03, 2018
Labor's Legacy in downtown Detroit, honoring the city's 300th anniversary in 2001.
Labor's Legacy in downtown Detroit, honoring the city's 300th anniversary in 2001.
Once again, I missed more than I got to experience, but nonetheless there was much of interest. (Side note: Two members of the ITSA board visited the…
June 07, 2018
Sacramento transit system hit by hackers
Sacramento transit system hit by hackers
The Sacramento Regional Transit (SacRT) system fell victim this past weekend to computer hackers. The hackers erased data and are now threatening to…
November 22, 2017
In an unfortunate scenario over the recent Thanksgiving weekend, hackers apparently breached San Francisco’s mass transit system, forcing the agency…
November 28, 2016
Security in intelligent transportation requires sensible planning and implementation of a defense-in-depth strategy. The combination of constructive, operational and reactive strategies over the long term can create a robust defense, where overall security can be achieved in scales greater than the sum of its parts.
Security in intelligent transportation requires sensible planning and implementation of a defense-in-depth strategy. The combination of constructive, operational and reactive strategies over the long term can create a robust defense, where overall security can be achieved in scales greater than the sum of its parts.
Many a traffic engineer is familiar with fiddling the door lock on a traffic controller cabinet. Not too long ago, that was the only security task in…
April 08, 2016
DOTs need to take the right steps to avoid attack
DOTs need to take the right steps to avoid attack
The transportation systems for highways and arterials in the U.S. have advanced from a collection of independently operating devices to highly…
April 08, 2016
DOTs cannot afford to take hand off cybersecurity switch
DOTs cannot afford to take hand off cybersecurity switch
If you are caught in the middle of this sandstorm, don’t even think about blinking your eyes. One second is all a hacker needs to penetrate a…
April 08, 2016
Subscribe to Cybersecurity
expand_less