Cybersecurity

Figure 4: AutomationDirect’s C-more HMI mobile app works securely when used in conjunction with the secure StrideLinx VPN router. It’s also available for Google Android. Courtesy: AutomationDirect
Cybersecurity September 20, 2019

Selecting HMI remote access options

Two leading methods exist for establishing mobile human-machine interface (HMI) connectivity; one providing more cybersecurity. See table comparison of remote access HMI connections.

By Jonathan Griffith
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 10, 2019

How to manage IoT cybersecurity

The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 6, 2019

Ensuring IIoT security best practices

The Industrial Internet Consortium (IIC) has developed a white paper designed to bolster best practices related to the Industrial Internet of Things (IIoT) and data security.

By Gregory Hale
Cybersecurity August 29, 2019

Industrial controller cybersecurity best practices

Protecting industrial automation systems is easier when controllers offer built-in cybersecurity features.

By Benson Hougland
Courtesy: CFE Media
Cybersecurity August 27, 2019

Four access control plan benefits for manufacturers

A solid access control plan can reduce the complexity in securing these critical spaces and protect a manufacturing facility and reduce potential theft as well as overall costs.

By Lynn Wood
Courtesy: Chris Vavra, CFE Media
Cybersecurity August 22, 2019

Program developed to train cybersecurity professionals

The University of Arkansas received a five-year, $4.63 million award from the National Science Foundation to recruit, educate and train the next generation of cybersecurity professionals.

By Gregory Hale
Emerging technologies are solving the problem of unconnectable assets, providing data from legacy systems to people on the shop floor. Courtesy: Fluke
Cybersecurity August 2, 2019

Modern technologies solve industrial cybersecurity needs

Emerging condition monitoring software and devices have ingrained cybersecurity that helps bring legacy systems and processes into the modern era.

By Edward Valencia
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 25, 2019

Cybersecurity alliance’s founding members announced

The International Society of Automation (ISA) named the founding members of its Global Cybersecurity Alliance (GCA): Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks.

By International Society of Automation (ISA)
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 8, 2019

Report finds cybersecurity basics still not being practiced by companies

A report from Applied Risk found that cybersecurity basics are still not being practiced by many companies, which is increasing their risk for potential attacks as untested technologies continue proliferating critical infrastructures.

By Applied Risk
Courtesy: CFE Media
Cybersecurity May 18, 2019

Securing electric substations

Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.

By Gregory Hale