FEATURED ARTICLESin Cyber Security
Cybersecurity Procurement Language for Energy Delivery...
Transmission & Distribution World
A variety of steps need to be taken throughout the life cycle of energy delivery systems to protect them from... MORE
Standardised technologies for secure real-time drilling data
What’s New in Process Technology
By Gregory Hale
To improve security and efficiency, drillers are seeking a secure connection to speed up... MORE
Cybersecurity requires fundamental systems architecture...
By Bill Lydon, Editor
Industry 4.0, Internet of Things (IoT) and Industrial Internet are all driving computing to automation edge devices. These... MORE
NEWSin Cyber Security
- IOActive adds two two Industrial Security experts
- Mfg Industry getting Malware-Laden Scanners
- Cloud Data Does the ‘Shuffle’
- Yokogawa Obtains ISASecure EDSA Certification for CENTUM
- FFR Raven for ICS recognized as CRT Tool by ISASecure
- Aramco Joins ISA Security Compliance Institute
- ISA Security Compliance Institute Introduces SDLA Certification
- Gartner Report rates cloud-based Sync and Share Solutions
- Icon Labs Floodgate Defender Achieves McAfee Compatible Status
- Standards update: IACS cybersecurity
- Importance of safety and security on the rise
- Threats to Oil and Gas Infrastructure Boost Need for Security Solutions
JULY FEATURED PRODUCTS
PRODUCT NEWSin Cyber Security
Belden updates Tofino Security solutions to be configurable
Updates include EtherNet/IP Enforcer, Tofino Xenon and Tofino Configurator (TC 2.0) that enable network managers to easily upgrade their existing... MORE
Lockheed Martin updates Industrial Defender visibility
Enhancements in v6.0 include FleetView, which provides visibility for control systems including changes that occur by location, over a period of... MORE
MEDIAin Cyber Security
RESOURCESin Cyber Security
Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE
IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE
WHITE PAPERSin Cyber Security
Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE
By Tony Paine, Kepware
Data has to be transmitted over public domains securely in order to protect the authenticity, integrity, and... MORE
CASE STUDIESin Cyber Security
Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE
EVENTSin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
The marcus evans 6th NERC Compliance Conference will address major issues such as CIP standards demonstrating the difficulties of legislating reliability and security, culture of compliance, audit preparation, transparency between regional entities, and federal legislative and regulatory concerns.
From robotics and automation services, to micro sensors and nanotechnology, Industrial Automation North America showcases the most important products in the industry and is the North American hub for innovation and networking in industrial automation.
TRAININGin Cyber Security
New this year with a Version 5 Foundations Course and a 2-day Deep Dive Course. The Foundation Course is perfect for both seasoned NERC CIP professionals seeking to ensure a smooth transition to version 5, as well as those new to NERC CIP who wish to jump start the learning process on these important standards. In the 2-day Deep Dive Course attendees will come away with detailed knowledge of...