What happens if hackers target an Army base?

Fifth Domain: The Department of Defense’s cyber teams have typically defended IP-based networks, but now leaders are requiring a sharper focus on other networks that power installations.

Army Cyber Command recently reorganized its list of priorities for some of its cyber protection teams. Defending industrial control systems (ICS) and supervisory control and data acquisition, known as SCADA, is one of the organization’s five priorities for defensive cyber operations.

Read article