FEATURED ARTICLESin Cyber Security
Cloud Computing vs. Field Controllers
By Bill Lydon, Editor
Some industrial automation vendors and computer technology providers are offering cloud services that include historians,...
Treat security like safety
By Gold and Baldi, Honewywell
Safety and security work hand in hand in the manufacturing automation arena. As cyber...
Securing automation systems: a step-by-step approach
There is no panacea
Ideally, users would like to have a tool, certification, or system that promises them long-term...
Tampering with the easy targets
By Ben Smith, Maxim Integrated
This second in a series on the basics of electronic security looks at the variety of malware attack...
NEWSin Cyber Security
- Secomea SiteManage is security certified by ProtectEM
- Infotecs Earns FIPS 140-2 Crypto Certification for ViPNet
- ADLINK opens demo room in Shanghai
- ISA responds to cybersecurity workforce development report
- Industrial Cybersecurity market immature
- Belden says Dragonfly Malware Targets Pharmaceuticals
- Smarter Grids That Outsmart Hackers—Industry Groups Drive Security Forward
- Cyber attacks: the danger from within
- Icon Labs Security Software achieves “McAfee Compatible” status
- DFI continues supports of XP-based Operating Systems
- OPC-UA Offers Security for Remote-Site Applications
- Is Linux More Secure than Windows?
PRODUCT NEWSin Cyber Security
Virtual Forge updates security on SystemProfiler SAP software
Enhancements in version 2.0 include 18 pre-configured test cases that check the security between the operating system and SAP.
Tempered Networks releases cybersecurity suite
Suite includes a scalable orchestration engine ( HIPswitch Conductor ), a series of hardened physical and virtual appliances ( HIPswitch ), and a...
NetBeez updates Performance Alerts network software reports
NetBeez software adds Performance alerts and Service Level Agreements reports.
MEDIAin Cyber Security
RESOURCESin Cyber Security
Security Application Site simplifies security design by providing access to the latest security resources all in one place.
Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for...
IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT.
WHITE PAPERSin Cyber Security
By Alan Grau, Icon Labs
The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or...
By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand...
By Mahesh Subrmaniam, HCL
Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded...
CASE STUDIESin Cyber Security
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted...
Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight...
EVENTSin Cyber Security
Cyber Security for Critical Assets Summit will connect Corporate Security professionals with Process Control professionals and serve to provide a unique networking platform bringing together top executives from USA and beyond.
What strategies can industrial enterprises adopt to help position them to take advantage of the latest round of technology changes while prioritizing their investments wisely? Join us at the Nineteenth Annual ARC Industry Forum to learn from your peers how an information-driven strategy can better position you to succeed and determine how you can best approach critical technology decisions.
The symposium will bring together experts, from end users, , engineering consultants and supplier communities in a two-day symposium to cover the important issues of automation and their impact on the pharmaceutical (and food) industry.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
With Microsoft’s recent end of support for Windows XP, running on an outdated SCADA system could be costing your company time and money. It could also compromise both the security and performance of your enterprise.
ICONICS securely connects to virtually any equipment, information system or network infrastructure through classic OPC, OPC UA, BACnet, SNMP, database, Web Service and Modbus standards. Learn how to use Platform Services with built-in auto-discovery and comprehensive security.