View All Cybersecurity
The importance of focusing on cybersecurity for SI projects
Industrial control system (ICS) cybersecurity is increasingly important. From the start, involve the right people from operational technology (OT) and information technology (IT) to collaborate on OT cybersecurity needs.
Removing IT/OT barriers to ensure plant floor safety, operational integrity
Securing industrial control systems (ICS) differs from protecting enterprise networking and information technology (IT) and operational technology (OT) teams must work toward alignment as cybersecurity threats rise.
Preventing cybersecurity attacks against food, beverage facilities
While innovations can help food processing facilities run smoothly, they can also leave them vulnerable to data breaches and cyberattacks. Four tips for preventing breaches are highlighted.
Four cybersecurity technologies, concepts can reduce industrial network risk
Explore the qualities and benefits of zero trust, principle of least privilege and other methods of improving cybersecurity. Four key technologies and security concepts are highlighted.
How software in the supply chain is an insider threat to ICS networks
A focus on the spectrum of insider threats against industrial control systems (ICS) and how they specifically relate to industrial environments
Protecting the power grid through cyber-physical threat response
Current methods of defending critical energy infrastructure from multi-stage, cyber-physical threats remain largely dependent upon human intervention and compartmentalized monitoring with an emphasis on prevention.
Industrial robot utilization requires cybersecurity strategy
Digitalization and AI bring opportunities for robots, but also a degree of cybersecurity risk as more data is gathered and processed all the way from the edge to the cloud and beyond.
More connected industrial workers: How are companies mitigating risk?
With more remote connections to industrial plants and facilities, risk of cybersecurity breaches has increased. What risk mitigation is in place?
Cybersecurity-centered systems and fundamentals
For modern industrial control systems (ICSs), cybersecurity involves technologies and user best practices. Four cybersecurity fundamentals are highlighted.
Hottest topics in industrial cybersecurity for 2021
Analysis of past attacks in the throwback attack series, attacks on operational technology assets, industrial malware, industrial ransomware and physical plant damage beyond computers are among leading topics of industrial cybersecurity interest in 2021.
Top 5 Plant Engineering articles Dec. Jan 3-9, 2022
Articles about cybersecurity and resilience in manufacturing, decoding your motor's nameplate, maximizing plant efficiency, and more were Plant Engineering’s five most clicked articles from Jan. 3-9, 2022. Miss something? You can catch up here.
Cybersecurity and resilience in manufacturing
Having an OT/IT convergence strategy is essential to OT cybersecurity.
Good cybersecurity requires IT/OT convergence
Bridging the gaps between information technology (IT) and operational technology (OT) can improve performance on the floor and reduce risks to operations.
Securing your facility
Many cybersecurity steps are simple, but they must be done
Cybersecurity and IT/OT convergence: A pathway to digital transformation
The history of industrial information technology (IT) set the stage for the Industrial Internet of Things (IIoT) and digital transformation; keep it safe with cybersecurity best practices.
Cybersecurity and IT/OT convergence: How important is your data?
Manufacturers should take time to delve deeper into the needs and goals of the organization while considering associated risks.
Bridging the IT and OT gap for a power service company
A power service company and system integrator collaborated to merge information technology (IT) and operational technology (OT) to create a secure platform for the power service company’s operations in Chile.
Cybersecurity and IT/OT convergence: How to prepare your team
As the IT and OT worlds continue to overlap, take time to prepare your team for the impact of IT security on OT applications.
What OT teams can learn from IT teams
By applying information technology (IT) strategies and organization, operational technology (OT) can monitor and manage cybersecurity measures more efficiently.
How manufacturers can improve cybersecurity
The rise of Industry 4.0 means there are greater cybersecurity risks and manufacturers and engineering sectors need to take a hard look at what they can do to keep their new systems safe.
Five levels of cybersecurity in an automated network
Best practices manufacturers can implement to better secure their network in many ways. Five levels of cybersecurity are highlighted.
Top 5 Plant Engineering articles Oct. 25-31, 2021
Articles about tackling overall equipment effectiveness to improve manufacturing operations, differences between NEMA and IEC electric motors, and more were Plant Engineering’s five most clicked articles from Oct. 25-31, 2021. Miss something? You can catch up here.
Cybersecurity demands coordinated tactics
Securing operational technology (OT) networks for resiliency against cyberattacks requires coordination between information technology (IT) and OT personnel, and recognition of the differences between the two domains
IT/OT convergence advice, best practices for manufacturers
Cybersecurity experts offer advice and best practices on information technology/operational technology (IT/OT) convergence and how manufacturers can prepare themselves for challenges.
How the EU Machinery Directive will change regulation
The EU Machinery Directive machinery covers not only physical components as well as digital components and software.
Cybersecurity project abroad deepwater drilling rigs
Naval Dome and the offshore division of a supermajor have identified and mitigated cyber risks common to offshore deepwater drilling rigs.
Importance of operational resilience in a threat landscape
Having realistic expectations of addressing a threat and knowing how to respond in an emergency in an efficient way are essential.
What to know if conducting business with the U.S. DoD
The cybersecurity maturity model certification and NIST SP 800-171 Department of Defense (DoD) Assessment explained.
Colonial pipeline attack debrief and lessons
Recent high-profile attacks such as Colonial Pipeline underline the point that critical infrastructure attacks will get worse before they get better.
Cybersecurity maturity model certification (CMMC) for the U.S. DoD supply chain
Cybersecurity vulnerabilities and intrusions pose major risks to the Department of Defense (DoD) and its supply chain which is why the DoD is requiring compliance to CMMC
How the American Jobs Plan could improve critical infrastructure cybersecurity
Provisions within the American Jobs Plan could improve critical infrastructure cybersecurity, but it's the first in many steps needed to make the nation safer from cyber attacks.
Upgrading industrial PC cybersecurity in manufacturing
Cybersecurity attacks against manufacturers and other industrial sites are growing and companies need to develop a cybersecurity plan that protects industrial PCs and other vulnerable targets that, until recently, were not connected to the internet.
How to protect OT/ICS systems from ransomware attacks
Reduce the risk of ransomware attacks on OT/ICS systems by following these prevention tips
TSA Pipeline cybersecurity directive announced
DHS and CISA released a security directive for critical pipeline operators
Manufacturers adjusting to a changing risk landscape
IEC 62443 can hold the answer to enhancing cyber resilience for manufacturers and smart factories as it aims to mitigate risk for industrial communication networks by providing a structured approach to cybersecurity.
Cybersecurity management tips for an organization
Having a robust strategy, building organizational engagement, and more importantly and realizing operational excellence are keys to cybersecurity management success.
Colonial Pipeline incident reinforces value of managed OT system isolation
The cyberattack that compromised Colonial Pipeline serves as sobering reminder that operational technology (OT) system isolation must be consistently managed. Four lessons from the incident are highlighted.
Cybersecurity for food and beverage operational technology (OT) environments
It's critical to realize the importance of cybersecurity in food and beverage manufacturing, an infrastructure that is often over looked.
Six steps for cyberattack incident response planning
Developing a strong cyberattack incident response plan requires a thorough examination of everything from building a response team to actually testing out the plan and ensuring it works.
Throwback Attack: Lessons from the Aurora vulnerability
A government-sponsored test on whether a cyberattack could inflict real-world physical damage has had major repercussions to this day. See eight steps on how to mitigate a potential cyberattack against your industrial control systems (ICSs).
SolarWinds’ impact on OT for manufacturers
The SolarWinds cybersecurity attack has had far-reaching effects in many different ways and it will change how operational technology (OT) handles cybersecurity threats.
How to protect marine renewable energy devices from cyberattacks
Pacific Northwest National Laboratory (PNNL) created a cybersecurity guidance report for marine renewable energy (MRE) devices to help improve MRE’s resiliency as a reliable source of renewable energy.
Top 5 Plant Engineering articles April 12-18, 2021
Articles about spare part inventory for maintenance organizations, how hyperautomation can help manufacturers, and how to resolve a conflict before it manifests itself were Plant Engineering’s five most clicked articles from April 12-18, 2021. Miss something? You can catch up here.
Secure remote connections
Industrial control systems require secure remote connections. Did the pandemic help IT to understand OT needs and help OT to see IT concerns about cybersecurity and remote access?
Introducing Industrial Cybersecurity Pulse
Industrial Cybersecurity Pulse is a new website dedicated to educating and informing engineers about the latest challenges and developments relating to cybersecurity, information/operational technology (IT/OT), the cloud and more. Check it out!
Hackathon event to analyze, prevent greenhouse gas emissions
The Microsoft Energy Core Methane Emissions Hackathon virtual event is designed to overlay oil and gas asset and geographic information system data to pinpoint leak location.
More answers on what you need to know about cybersecurity
Below are more answers resulting from a cybersecurity webcast on cybersecurity architectures, training, best practices, risk assessment and trends based on research.
Cybersecurity and the rise of IT-enabled OT systems
Information technology strategies can help combat new cybersecurity vulnerabilities and deploy a solid cybersecurity program for operational technology use for industrial control systems, remote terminal units, supervisory control and data acquisition systems, as Industrial Internet of Things deployments increase.
Secure-by-design industrial products are increasingly important
Cybersecurity often is the catalyst for control system modernization, and industrial and critical infrastructure sector projects increasingly specify automation products and systems that are designed as cybersecure.
Resiliency, security needed for digital automation future
Manufacturing's resilience has been strong during the COVID-19 pandemic, and cybersecurity needs to be stronger than ever as the nature of work changes.
IIoT’s growing impact on ICS cybersecurity
The Industrial Internet of Things (IIoT) will have the strongest impact on operational technology/industrial control system (OT/ICS) cybersecurity.
Bureaucracy is an obstacle for cybersecurity projects
The inability to stop production and a bureaucratic approval process are the main barriers that inhibit industrial cybersecurity projects according to a report by Kaspersky.
Building automation, oil and gas facilities are top cybersecurity targets
There has been an increase in the percentage of systems attacked in the oil and gas industry as well as the building automation sector during the COVID-19 pandemic.
Technology hikes supply chain security, reduces risk
Regardless of how companies buffer supply chain gaps, they need to be cybersecure.
Physical security: picking up the pieces
Businesses need to be ready to pick up where they left off when it comes to enhancing physical security measures in the wake of COVID-19.
System integrators need to comply with international cybersecurity requirements
System integrators need to ensure that their automation systems are IEC 62443-compliant to adhere to international cybersecurity requirements.
Securing the IoT by design
There are several preventive measures that can be taken to secure industrial processes against cyber attacks.
Four tips on cybersecurity risk assessments
It’s hard to know how much cybersecurity spending is enough to lower risk to an acceptable level. What is enough and what else is needed? A cybersecurity risk assessment (CRA) can help. Four tips are highlighted.
Remote teams struggling to mitigate cybersecurity risks
More workers are forced to work remotely due to COVID-19, but cybersecurity prevention and training is lagging behind.
How COVID-19 is affecting manufacturing cybersecurity
Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.
Many industrial control systems can be exploited remotely
More than 70% of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely according to a report by Claroty.
Hackers exploiting COVID-19 anxiety in targeted phishing scams
Phishing assaults are becoming increasingly targeted, and the COVID-19 pandemic is one of many ways hackers are exploiting people and small companies.
Virtual private network holes elevate remote access risk
Virtual private network (VPN) implementations that give remote access to operations technology (OT) networks have received more focus due to COVID-19 since more people are working remotely.
Secure remote access to survive and thrive
Secure remote access (SRA) is being used to help companies survive and thrive during the COVID-19 pandemic, but there are some new challenges that need to be considered. See 10 remote access best practices.
Phishing heads COVID-19 themed attacks
COVID-19 cyber attacks are on the rise according to researchers, and they are getting very sneaky in their methods.
New ways to attack Industry 4.0
Researchers warn smart manufacturing users and security professionals to be aware of advanced hackers.
DDoS attacks on rise due to COVID-19
The amount of distributed denial of service attacks (DDoS) rose at the beginning of this year primarily on education and municipal sites.
Oil and gas industry facing spearphishing attacks
Cyber criminals are aiming their attacks at the oil and gas sector by impersonating specific engineer contractors and shipping companies. Know what to look for and how to avoid a cyber attack.
Protecting worker safety, security after COVID-19 pandemic
Expectations for workers are changing due to the pandemic. Even after they return to work, it's going to be different, and companies need to adjust to this and ensure their workers are cyber-secure.
Tech giants unite in COVID-19 smartphone effort
Google and Apple unveiled a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of COVID-19 while protecting user privacy.
IT-OT collaboration needs context and increased visibility
Information technology (IT) and operational technology (OT) are continuing the process of working together, but non-manufacturing types need more understanding and context of what is happening on the plant floor for this merger to work.
Engineers working on cybersecurity for systems linking solar power to grid
A researcher at the University of Arkansas is leading a project to invest in new projects that will lower solar electricity costs, while also making solar systems more resilient to cyberattack.
Associations unite for COVID-19 recovery
ASIS International and the Security Industry Association have partnered to help in the coronavirus recovery and rebuilding efforts. The primary focus areas will begin with business operations and advocacy, and content development and coordination.
COVID-19 cyber attacks and scams are a global issue
Cyber criminals are taking advantage of COVID-19 forcing the majority of employees forced to work remotely. Europol published an updated threat assessment after monitoring the impact of coronavirus and cybercrime.
Coronavirus phishing attacks rising
With many employees working remotely, there is a rise in COVID-19 themed email phishing scams. Follow these suggested tips to keep companies safe.
Comprehending OT supply chain risk
It's crucial to recognize the possible threat from a supply chain risk and understand best practices to avoid them.
Hackers using COVID-19 to find OT, IoT gaps
Employees working from home need to be vigilant about phishing campaigns using COVID-19 related content to find gaps and organize cyberattacks.
Five tips to stay cyber secure when working remotely
Because of the coronavirus pandemic, more people are working remotely to avoid getting sick. Consider these five tips to make sure your cyber hygiene is as strong as your physical hygiene.
COVID-19 and remote access challenges for manufacturers
Companies are starting to offer protected remote access at no cost in response to the large number of employees working remotely due to coronavirus.
Remote security working in world of coronavirus
With a large influx of people working remotely due to COVID-19, cybersecurity is becoming a topic of concern for employers and their employees.
Good cybersecurity hygiene needed by businesses
Good cybersecurity hygiene is needed as more employees move toward working out of their homes in the wake of the coronavirus pandemic.
Coronavirus used in malware attacks
The coronavirus disease (COVID-19) is being used as bait in email spam attacks on targets around the globe by using the promise of information or a cure to fool people.
Understanding ransomware attacks and the people behind it
Ransomware and cyber attacks are increasing against manufacturers. Some are trying to understand more about the people behind them and their motives, which are not always clear.
Manufacturers realize cybersecurity risks, taking steps
Manufacturers are realizing the potential dangers from cyber attacks, but that is the first step in the process. Learn how companies are trying to combat this growing problem and what more they can do.
Boosting security of process control chemical systems
Wayne State University researchers have developed a process designed to enhance cybersecurity of chemical process control systems.
Strategies for securing the supply chain
The National Institute of Standards and Technology (NIST) is working on a publication designed to reduce cybersecurity risks to the supply chain.
The most infamous cyber-attacks on industrial systems
Cybersecurity attacks are designed to undermine the integrity of critical processes
Utilities benefit from a risk-based approach to cybersecurity
Utilities need to embrace a risk-based approach to cybersecurity to match the existing basic-level of compliance. See four issues utilities are currently facing.
Extend IT security to the plant floor
Cybersecurity is critical as information technology (IT) and operations technology (OT) converge, which is the first step in making the transition between the two sides almost seamless.
Physical and cybersecurity are converging
The distinction between digital and physical cybersecurity is vanishing, and the risks associated with connectivity have accelerated the need for new security protections in all aspects of manufacturing.
How to manage IoT cybersecurity
The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.
Industrial controller cybersecurity best practices
Protecting industrial automation systems is easier when controllers offer built-in cybersecurity features.
Four access control plan benefits for manufacturers
A solid access control plan can reduce the complexity in securing these critical spaces and protect a manufacturing facility and reduce potential theft as well as overall costs.
Program developed to train cybersecurity professionals
The University of Arkansas received a five-year, $4.63 million award from the National Science Foundation to recruit, educate and train the next generation of cybersecurity professionals.
Modern technologies solve industrial cybersecurity needs
Emerging condition monitoring software and devices have ingrained cybersecurity that helps bring legacy systems and processes into the modern era.
Cybersecurity alliance’s founding members announced
The International Society of Automation (ISA) named the founding members of its Global Cybersecurity Alliance (GCA): Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks.
Report finds cybersecurity basics still not being practiced by companies
A report from Applied Risk found that cybersecurity basics are still not being practiced by many companies, which is increasing their risk for potential attacks as untested technologies continue proliferating critical infrastructures.
Securing electric substations
Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.
Improving cybersecurity in robotic automation
Cybersecurity in the robotics field is still immature, but manufacturers are starting to realize the vulnerability that connected robots and automation equipment creates in their operations.
Utility sector strengthens security posture with rise of IIoT
Cybersecurity: Improving evaluation and certification methods, security audits, and testing provide a foundation for evaluating Industrial Internet of Things (IIoT) devices.
Proactively manage industrial cybersecurity by automating risk monitoring
Cover story: A refinery installed a modern distributed control system (DCS) that automates and manages industrial cybersecurity tasks to reduce manual workflows, potential human error and overall company costs.
Manufacturing and process facility trends: Cybersecurity
Technology update: Cybersecurity remains a key concern for manufacturing and process facilities as explained in the media session at ARC Forum 2019.
Four cybersecurity questions to ask during digital transformation process
Cybersecurity is a major concern during digital transformation and companies should be asking plenty of questions about how prepared everyone is.
Ethernet device servers
Sixnet’s new industrial serial to Ethernet device servers (Models ET-DS-1 and ET-SDS-1) connect serial-based software applications over Ethernet to remote industrial serial devices. The two models offer real-time secure performance including an auto-detecting 10/100 RJ45 Ethernet port and a universal EIA-RS232/422/485 Serial port for serial data tunneling across an IP network.
Study finds USB drives are a security threat to process control systems
Honeywell research finds exposure through portable USB drives can cause serious disruption to process facilities through unsecure or malicious files.
Control system migration: Plan early and collaborate
Front-end loading (FEL) offers advantages for planning and budgeting
Digital supply chain has arrived; challenges await
MHI study cites three barriers to digital supply chain adoption, but a majority of companies already use the technology.
Focus is cybersecurity, robotics at GAMS 2018 event
Cybersecurity, maintenance, and robotics are among the most discussed topics in manufacturing, and those topics will be the focus at the 2018 Global Automation and Manufacturing Summit (GAMS).
Cybersecurity issues: risks and liabilities
Aon’s Chad Pinson talks about how manufacturing must react to growing threats .
Step-by-step to Industrie 4.0
Maturity Index helps manufacturer create a roadmap for the future.
‘Digital transformation’ on the ARC agenda
The focus of this year's ARC Advisory Group;s annual conference will be the digital transformation of manufacturing.
2017 Engineering Leader Under 40: Galina Antova, 35
Co-founder and Chief Business Development Officer, Claroty, New York
How digitalization is changing the face of cyber security
Whitepaper: How digitalization is changing the face of cyber security.
‘Industry in transition’ transformed by open systems
ARC’s Andy Chatha sees machines getting smarter, and plant management needs to follow suit to match this trend.
Top 5 Plant Engineering articles, September 7-13: Maintenance and the IIoT, skilled workers and apprenticeships, manufacturing maintenance practices, more
Articles about maintenance and the IIoT, apprenticeships and skilled workers, world-class manufacturing maintenance, predicting equipment lifecycle, and optimizing electrical systems were Plant Engineering’s five most-clicked articles from last week, September 7-13. Were you out last week? Miss something? You can catch up here.
‘The new age of disruptive innovation’
IIoT experts say emerging manufacturing models will change plant processes.
The C-more HMI configuration software version 6.0 delivers more functionality, more usability and more value.
2014 Salary Survey: Confidence rises amid the challenges
After almost a decade of uncertainty, the confidence of plant floor managers is soaring. Even with a number of challenges and while implementing new technologies, there is a renewed sense of optimism among plant managers about their business and their future.
The changing plant floor: from M2M to IoT
Connectivity improvements are poised to transform manufacturing
Is U.S. dominance in military robotics starting to crumble?
Foreign Policy Magazine's recent examination of "The Looming Robotics Gap" by University of Pennsylvania international relations associate professor Michael C. Horowitz, and a recent Pentagon insider on national security issues, is an up-to-date review of the worldwide state of military robotics.
Big boost in cyber investment
Security is becoming mainstream as 93% of companies globally are maintaining or increasing their investment in cyber security to combat the ever increasing threat from attacks, a new survey said.
EPA methane emission methods questioned
Two Republican senators urged the Environmental Protection Agency (EPA) to reconsider its methods of calculating methane emissions from natural gas operations.
Security: Automating the unspoken word
The unspoken knowledge shared by cyber security analysts could convert into an automated tool that helps analysts strengthen their cyber defenses.
Data breaches go undisclosed
Malware striking systems may be more prevalent than suspected as 57% of malware analysts working on enterprise-related data breaches have addressed security problems that U.S. firms failed to disclose, a new survey said.
Honeywell User Group: Understand risk
No industrial control system can ever be 100% secure, that is a given, but a manufacturer has to understand the threat and know how far they want to go and still remain confident they can withstand the inevitable attack.
Milestone Systems and genetec enjoy joint No. 1 VMS ranking in 2012
IMS Research reports that Milestone Systems and Genetec were the No. 1 suppliers in the VMS market, which is expected to expand in EMEA and China in future years.
Budgets for Physical Security Equipment Are Increasing for End Users
A survey, completed primarily at the end user management level, solidifies trends seen in many IHS studies over the last 12 months.
HVLS fans deliver energy savings from the top down
Indoor air quality: Food redistributor overcomes high ceiling and high energy costs to better manage heat
Seven tips to help combat counterfeits
Following these seven tips can help you spot counterfeit products and keep your workers and plant safe from potential hazards
Concentrated solar power a boost for utilities
The storage capacity of concentrating solar power (CSP) can add significant value to a utility’s optimal mix of energy sources, a new report said.
Cyber war stakes rising
U.S. intelligence officials have warned as nation-sponsored cyber warfare goes mainstream this year, attacks on U.S. installations and institutions could result not just in damage and theft but in fatalities.
Electric grid vulnerable to attack
The National Research Council and Department of Homeland Security have concluded that electric grids are vulnerable to cyberterrorism and the damage would be far more catastrophic than natural disasters like the recent Hurricane Sandy in October 2012.
Hackers target sites victims visit
Hackers are using knowledge about their intended targets to predict the websites they visit and seize private information
Seven tips to combat counterfeit electrical equipment
Eaton expert cites dangers to employees, economy from fake products
2012 POY Finalists: Energy Management
Finalists in the Energy Management category for the Plant Engineering 2012 Product of the Year competition
New tool shows cyber security strength
Cyber security is a major issue for utilities because of the potential vulnerabilities, the investments and the risks. The big questions always stares everyone straight in the face: Will the security actually work?
HUG: Myth of air gaps
In case anyone was wondering, air gaps don’t exist.
RPI’s disaster management simulator
A disaster may never occur, but it is nice to know if one does, a system is in place to take on whatever elements present themselves.
Verticals guide the way to competitive advantage in Latin America
Hospitality, commercial and manufacturing and industrial are the fastest growing verticals for access control equipment in Latin America.
China-U.S. manufacturing cost gap keeps shrinking
Flow of manufacturing jobs between China and the West to equalize.
Pairing security, fault tolerance
There is a need for improved cyber security for industrial networks, all security professionals know this. After all, the whole industrial automation world was stunned by the sudden appearance of Stuxnet in 2010.
Saudi Arabia – A fast growing market for video surveillance equipment
The 2012 Middle East Market for CCTV and Video Surveillance Equipment report by IMS forecasts that the market in Saudi Arabia will grow strongly to overtake that of the United Arab Emirates to become second largest in the region.
BRICs bolster global video surveillance market growth in 2012
IMS Research has just published the ninth edition of its World Market for CCTV and Video Surveillance Equipment report. The 2012 edition forecasts that despite the weak and uncertain economic climate, the world market for video surveillance equipment will grow in excess of 12% in 2012.
Security systems integrators unsure of IT distributors
A new report from IMS Research has found that almost 40% of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products.
Cloud computing security woes
Security experts are blaming cloud computing providers for giving cyber criminals the tools to launch attacks more easily, efficiently and anonymously than ever before.
HANNOVER MESSE: Chinese premier promises ‘openness’ in manufacturing market
Wen cites challenges, concedes China has ‘a long way to go’ on manufacturing quality
IMS Research Partners with PSA Security Network
Reports provide insight into the key trends in the security industry, helping security integrators understand technology challenges, the competitive landscape and growth opportunities.
Surge protective devices (SPDs)
PowerSure CM Series
Survey: Malicious attack costs grow
Criminal and malicious attacks accounted for 37% of corporate data breaches in 2011, a 6% rise from 2010, a new study said.
Operator workstations certified for hazardous conditions
Visunet IND SlimLine Operator Workstations have received Zone 2 certification for use in hazardous environments
Cyber security bill launches in Senate
Cyber security legislation that would update laws that govern how the federal government secures its information systems as well as help safeguard vital private networks that American society depends on hit the Senate last week.
Improving security in the cloud
Cloud computing will keep increasing as the demand for computing power increases.
Small businesses lack disaster recovery plans
It is not surprising because of short staffing, but when it comes to planning for the worst, small businesses don’t even come close to being able to tackle a serious dilemma.
Trojan APT hits DoD smart cards
A variant of the Sykipot Trojan Horse is able to hijack U.S. Dept. of Defense (DoD) smart cards in order to access restricted resources.
Supply chain changes: 10 predictions for the new year
Software provider sees a more flexible, dynamic supply chain process
Confidence growing in new access control technologies
Over the past few years I’ve witnesses many changes in the access control industry. The question that immediately comes to my mind is if changes began to take place during a downturn where budgets were tight, how will the market look in three or four years?
Wireless networking security a must
The new era of Ethernet and wireless networking in industrial applications has increased security concerns to an all time high, and for good reason.
Video business intelligence (or VCA, rebranded)
When VCA was first introduced, its capabilities were often oversold. As the technology did not always live up to expectations, some customers became dissatisfied and this created negative publicity. There was a general perception that VCA did not work as well as it should.
2011 POY Finalists: Productivity Training Software
Finalists in Productivity Training Software in Plant Engineering’s 2011 Product of the Year competition
Report: SCADA systems under siege
A new report details trends that may lead to improvements that will help to protect a system from attack.
U.S., India ink cyber security cooperation pact
The United States and India signed a Memorandum of Understanding to foster closer cooperation and timely exchange of information between their respective government organizations responsible for cyber security
Secure smart grid moves forward
Talk is starting to actually move to action as companies are beginning to make a big push to really make the Smart Grid a secure reality. Sensus, the Raleigh, NC-based company, recently incorporated encryption and key management technologies from IBM
Riot Raises Questions Regarding CCTV Effectiveness
This week’s riots in London have shown that there is a limit to what electronic security can do: at some point you’ll need a pair of boots and a truncheon. But even then there have been complaints about ineffective deployment of the police; being in the wrong place at the wrong time.
For end users: Security 101
If end users were not frightened before the Siemens 2011 Automation Summit, they are now as cyber security took center stage.
Grid security exercise from NERC
The grid security exercise will test NERC and the electricity industry’s crisis response plans and validate current readiness in response to a cyber incident.
Preparing for all types of attacks
There are intended and unintended hits, or attacks, on control systems and if you believe what one study says, 20% are intentional and 80% unintentional.
Analyzing Stuxnet with Siemens
Two security experts at the 2011 Siemens Automation Summit talked about lessons learned during the Stuxnet affair.
Stuxnet: A turning point
This is an explosive new age of industrial productivity and with that brings a bigger risk for cyber attackers to hit manufacturers.
Safety hike after Yellowstone burst
Exxon Mobil took twice as long as it said it did to fully seal a pipeline that spilled 1,000 barrels of crude oil into the Yellowstone River, according to federal documents.
Web site to help explain OSHA recordkeeping rules
Web tool to help users determine whether injuries and illnesses are work-related and recordable under the OSHA Recordkeeping rules
ASSE drafts new legislation for U.S. Congress
Bill aims to change federal law to help improve U.S. oversight of workplace safety and health.
Best Practices: Propane-fueled forklifts deliver savings, performance
Propane-fueled forklifts maintain consistent, 100% power throughout operation, reduce greenhouse gas emissions, and have a well-established fuel delivery and cylinder exchange structure.
Recurring Monthly Revenues (RMR) a key topic at PSA-Tec
For many of the integrators attending the show, the RMR model helps with financial and strategic planning, making it easier to forecast growth and identify areas and regions that need extra resource. It can also be appealing to investors who appreciate the security of this future revenue source and can offer some resilience to shorter-term economic problems.
Will cloud concerns impact VSaaS?
With a well-established cloud based service experiencing difficulty and a global technology brand’s IT system hacked; does this raise concerns about the current trend towards cloud-based physical security?
Water utility suffers cyber incident
A water utility reported a cyber incident when remote users experienced difficulties logging into the control systems, according to an ICS-CERT report.
NSA chief: Grid ripe for attack
Electric companies in the United States might not be able to protect the power grid in the United States from a cyber attack, said the director of the National Security Agency (NSA).
Secure OPC keeps attackers at bay
Automation systems remain vulnerable and exposed. Past experiences like Stuxnet and last month’s revelations about SCADA system vulnerabilities show networks are sitting ducks to any aggressive and sophisticated attack.
Introducing the IMS Research security blog
The purpose of this blog is provide manufacturers, systems integrators, distributors, investors and other interested parties with regular "snapshot" market statistics and analyst opinions.
Malware report: Learn from past attacks
Stuxnet was the biggest and most noteworthy attack on the industrial control environment, but it was not the biggest in terms of documented and investigated malware incidents
Hackers get hacked
Even hackers face problems with hackers.
Stuxnet report III: Worm selects site
Now it is time to turn the table and ask “How might this target protect itself from a worm like Stuxnet?”
OSHA focuses on work safety during North American Occupational Safety and Health Week
Awareness about the importance of preventing work injuries and illnesses presented by OSHA during North American Occupational Safety and Health (NAOSH) Week
Physical Security: Thieves dig for water equipment
Cyber security is a key element for manufacturers to protect against computer-oriented thieves, but no one can over emphasize the importance of physical security
‘Night Dragon’ follow: Six oil firms hacked
Exxon Mobil, Royal Dutch Shell and BP are three of the six major energy companies hit by cyber attacks through Internet servers in China where thieves stole proprietary information, according to officials close to the investigations
ASSE supports OSHA’s injury, illness prevention program standard
The American Society of Safety Engineers has reiterated to the House Committee on Oversight and Government Reform of the society’s support for the Occupational Safety and Health Administration’s development of an injury and illness prevention program standard.
Study: Oil, Gas Cyber Threats Heighten
It is no secret oil and gas companies face cyber security threats on a daily basis, but the level of the attack are becoming more sophisticated and well-organized through criminal syndicates and terrorist groups, according to a new report
Security Risk Publications Hit Street
There is now groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the level of individual systems
Password Reuse – Control Networks Double the Risk
Some control system vendors continue to bury hidden “default” passwords in their system
Mitigation Strategy Outlined: Stuxnet Video
Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.
Stuxnet: Joint operation nets victim
The newest and strongest clues point toward Stuxnet being an American-Israeli project to sabotage the Iranian’s nuclear program.
Security zones create ‘architecture of fear’
Parts of America’s most prominent downtowns remain largely sealed off as security zones, which has led to blighted landscapes, limited public access and a need for a new approach to urban planning, according to a new study.
HDTVs vulnerable to hack attacks
Hackers can potentially use Internet-connected HDTVs to infiltrate malware into home networks, according to a new report.
Cyber security bill in Senate
A bill that would force the government and the private sector to require minimum cyber security standards for devices that connect to the Internet is out on the Senate floor.
Password Reuse – Control networks double the risk
Control system vendors continue to bury hidden "default" passwords in their system which can fall victim to malware or hackers, making them the perfect backdoor into a company's operations.
DHS Launches Cyber Center
To ensure a secure operating environment, there needs to be top flight communication and the Department of Homeland Security (DHS) is looking to do just that. DHS launched a cyber security center so it can communicate more efficiently with state and local governments about potential cyber threats to critical U.S. infrastructure. https://www.isssource.com/dhs-launches-cyber-center/.
Data acquisition, display station
This data acquisition and display station features 400 MB of internal flash memory, custom graphics, alarm annunciator display mode and open network connectivity. An advanced security option enables 21 CFR Part 11 compliance.
AAM, UAW plan to return to negotiations
According to an Associated Press report, UAW and American Axle and Manufacturing Holdings Inc. will return to negotiations April 9.
Welcome to the era of the industrial athlete
Like his counterparts on the gridiron or the diamond, the Industrial Athlete looks for every edge to stay competitive on the job. It’s a term coined by Randy Kates, the manager of safety business for Kimberly-Clark Professional, a leading safety and personal protective equipment provider for manufacturing.
ABB consortium to fund advanced SCADA security research
Twelve of ABB’s utility partners have formed a consortium to privately fund research and testing into securing supervisory control and data acquisition systems that protect the nation’s electric grid.
Blog! Five Fast Things for March 2, 2007
1. Manufacturing is cool! I know that. You know that.
Plant Engineering Exclusive: Wireless sensor detects open circuits, alerts maintenance
Cooper Bussmann announced its venture into wireless technology on Feb. 15 with the launch of the Cooper InVision system. This system detects when a circuit protection device has opened, and alerts maintenance personnel which device has operated, where it is located, the part number of the replacement device and the appropriate level of personal protective equipment to wear to replace or reset the device. The Cooper InVision system includes wireless sensors, mesh routers and gateway.
Getting into e-learning for workforce training
As the shortage of skilled workers grows and the complexity of industrial jobs increases, new methods are being developed to provide the training these workers need. The field of e-learning is at the forefront of this effort.
Maintenance Tips & Tricks – 2000 – #16
Protecting eyesProblem: When grinding or cutting metal, employees would occasionally get particles in their eyes, even when wearing the proper personal protective equipment. Is there a way to prevent this potentially serious problem? Solution: Place a small, inexpensive magnetic strip (about 1 in. 3 1 in.) on the bill of the worker's hardhat.
Finding the safe way
Safety Answer Book helps determine -- in a matter of seconds -- which OSHA, DOT, and EPA regulations affect a plant. It provides answers to basic compliance questions on 71 workplace topics.
An 8-p publications supplement presents recent titles in educational and training materials for security. References are offered for both experienced security practitioners and those new to the field. American Society for Industrial Security www.