FEATURED ARTICLESin Cyber Security
‘Cloud-based’ machine remote-access: how secure is it?
By Dave Hammond, M.A.C. Solutions
For machine builders that offer remote access support and diagnostics for their installed machines, security is...
Protecting your production line from cyber attacks
By Jonathan Wilkins, European Automation
Five years after the Stuxnet attack, all SCADA and PLC systems across the manufacturing industry are...
Buy vs. Build: the great Security Framework Debate
By Alan Grau, Icon Labs
Securing IoT devices is a complex task. OEMs can reduce development cost and time to market by utilizing a security...
Control system cybersecurity
By Albert Rooyakkers
All ICS modules that compute process control logic, including but not limited to sensors, actuators, I/O, control,...
NEWSin Cyber Security
- ISA Executive Director delivers keynote at US Chamber of Commerce Cybersecurity Conference
- Cybersecurity Added to The EtherNet/IP Specification
- Network Vulnerabilities Keep Automation from Living Up to Full Potential
- MESA forms Cybersecurity Working Group
- exida announces winners of their 2015 safety awards
- Schneider Electric achieves ISASecure SDLA certification
- DAkkS signs MOU with the ISA Security Compliance Institute
- Emerson improves DeltaV and AMS cybersecurity
- Emerson adds Intel Security solutions
- ISA approves Hitachi Raven ES Test tool
- KPMG joins ISA Security Compliance Institute
- Skkynet supplies secure communications to Red Lion Controls
PRODUCT NEWSin Cyber Security
Axiomtek announces IFW330 firewall
IFW330 integrated industrial 3-port firewall with NAT/VPN/router protect automation networks including EtherCAT, Ethernet/IP, Lonworks, Profinet...
Attivo updates BOTsink SCADA cyber attack detection software
Instead of relying on signatures or known attack patterns, Attivo uses deception technology to lure the attackers to a BOTsink engagement device.
Phoenix Contact releases TC mGuard cellular connection
TC mGuard uses cellular networks, such as Verizon and AT&T, to provide secure remote communications wherever a wired connection is not possible.
MEDIAin Cyber Security
RESOURCESin Cyber Security
The license for Phoenix Contact’s FL mGuard security devices can protect OPC Classic applications.
CFSE program for ICS offers CACE and CACS certifications
Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets
WHITE PAPERSin Cyber Security
By Cisco and Rockwell Automation
White paper introduces an approach to security policy enforcement that tightly controls access by anyone inside...
By Cisco and Rockwell
Many manufacturers segment business-system networks from plantwide networks by using an industrial demilitarized zone...
By Tempered Networks
White paper describes the Tempered Networks solution, a network segmentation product based on the International Society of...
CASE STUDIESin Cyber Security
FRIMO has integrated 80 remote service connectivity solutions. Using VNC (virtual network computing) software, the entire screen content of the...
By Rob Speigel
Over the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works...
Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...
EVENTSin Cyber Security
Join us at the 20th annual ARC Industry Forum to learn more about how this industrial transformation will unfold. Discover what other companies are doing today to prepare for the new age of industrial innovation and how they expect to improve their business performance by doing so.
With the leading trade fairs taking place in parallel, HANNOVER MESSE covers a wider range of themes and exhibits than any other event – R&D, industrial automation and IT, industrial supply, production engineering and services, as well as energy and environmental technology. in 2016, the USA is making its debut as the Partner Country at the world’s largest industrial technology event.
The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
Join us for the 11th annual ICS Security Summit. The Summit is the premier event to attend in 2016 for ICS cybersecurity practitioners and managers. This year's summit will center on the theme "Defense is Doable" and will feature more in-depth technical talks, case studies, and hands-on challenges than ever before.
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology.