FEATURED ARTICLESin Cyber Security
Focus on Industrial Internet of Things (IoT) Infrastructure
By Bill Lydon, Editor
By recently joining the Industrial Internet Consortium (IIC), MOXA emphasized their strong focus on the Industrial Internet... MORE
Securing Existing Control Networks: A Plan for Guarding...
By James R. Koelsch
Most discussions about securing control networks assume that you're starting with a clean slate. Since... MORE
The NIST Framework – Protecting Your SCADA Infrastructure
By Edward Nugent, PcVue
The implementation of Cybersecurity under the NIST Framework is ultimately the responsibility of the SCADA Application... MORE
NEWSin Cyber Security
- ADLINK opens demo room in Shanghai
- ISA responds to cybersecurity workforce development report
- Industrial Cybersecurity market immature
- Belden says Dragonfly Malware Targets Pharmaceuticals
- Smarter Grids That Outsmart Hackers—Industry Groups Drive Security Forward
- Cyber attacks: the danger from within
- Icon Labs Security Software achieves “McAfee Compatible” status
- DFI continues supports of XP-based Operating Systems
- OPC-UA Offers Security for Remote-Site Applications
- Is Linux More Secure than Windows?
- The UK needs better Security for Critical National Infrastructure
- What Are You Doing About Cybersecurity?
OCTOBER FEATURED PRODUCTS
PRODUCT NEWSin Cyber Security
Icon Labs releases Floodgate Anti-Tamper security software
Anti-Tamper support makes it more difficult for a hacker to change the software or firmware running in an embedded device, or even change the... MORE
MEDIAin Cyber Security
RESOURCESin Cyber Security
Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE
IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE
WHITE PAPERSin Cyber Security
By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand... MORE
Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE
CASE STUDIESin Cyber Security
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN... MORE
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted... MORE
Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE
EVENTSin Cyber Security
Remote Monitoring & Control 2014 will cover the latest advancements for monitoring and managing distributed equipment and facilities via recent developments in SCADA, remote networks (wireless & wired), security (cyber & physical), automation, onsite and back-up power, M2M and all other manner of technology that allows for the management of remote assets.
This one day conference will provide engineers, project managers, and control automation professionals with data connectivity and security information they need to increase the performance, efficiency and safety in their projects.
Rockwell Automation welcomes industrial professionals, media, analysts, and technology and service providers to its Automation Fair® event. Through exhibits, labs, technical sessions and forums, attendees will learn how to leverage the connected enterprise to optimize production, improve machine performance, and manufacture products in a safer, more sustainable manner.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
With Microsoft’s recent end of support for Windows XP, running on an outdated SCADA system could be costing your company time and money. It could also compromise both the security and performance of your enterprise.
ICONICS securely connects to virtually any equipment, information system or network infrastructure through classic OPC, OPC UA, BACnet, SNMP, database, Web Service and Modbus standards. Learn how to use Platform Services with built-in auto-discovery and comprehensive security.