FEATURED ARTICLESin Cyber Security
The Energy Sector is Under Attack: How to Protect the...
By Kenneth Tom, Wurldtech Security Technologies
Today, the smart grid is under attack. We need to protect this infrastructure and provide proper... MORE
Managing Intellectual Property Risk with Outside Contractors
By Bill Lydon, Editor
Every time you contract a third-party service provider, you are putting your company’s intellectual property (IP) at risk.... MORE
The industrial sector: An environment uniquely vulnerable...
By Mary Ramsey, Schneider Electric
In the past, industrial networks were primarily isolated systems, running proprietary control... MORE
NEWSin Cyber Security
- Belden says Dragonfly Malware Targets Pharmaceuticals
- Smarter Grids That Outsmart Hackers—Industry Groups Drive Security Forward
- Cyber attacks: the danger from within
- Icon Labs Security Software achieves “McAfee Compatible” status
- DFI continues supports of XP-based Operating Systems
- OPC-UA Offers Security for Remote-Site Applications
- Is Linux More Secure than Windows?
- The UK needs better Security for Critical National Infrastructure
- What Are You Doing About Cybersecurity?
- IOActive adds two Industrial Security experts
- Mfg Industry getting Malware-Laden Scanners
- Cloud Data Does the ‘Shuffle’
SEPTEMBER FEATURED PRODUCTS
PRODUCT NEWSin Cyber Security
Ultra Electronics adds miitary crypto to EtherGuard L3...
FIPS 140-2 level 2 validation was added to the EtherGuard L3 endpoint security device, enhancing machine-to-machine communications. MORE
Belden enhances Eagle Industrial Firewalls for more Security
EAGLE20-0400 and EAGLE30-0402 now have software that heightens network performance and adds more robust security features for the EAGLE firewalls. MORE
Wibu updates CodeMeter Embedded software for better...
CodeMeter Embedded Driver 1.7 replaces the CodeMeter Runtime on Windows CE, protects against reverse-engineering, and has been enhanced to address... MORE
MEDIAin Cyber Security
RESOURCESin Cyber Security
Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE
IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE
WHITE PAPERSin Cyber Security
By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand... MORE
Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE
CASE STUDIESin Cyber Security
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted... MORE
Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE
EVENTSin Cyber Security
Key European and International Energy, Government and Cyber Security leaders meet in London for an exclusive two day conference to address growing and persistent threats to Critical National infrastructure. This two day networking and information sharing event will provide specific insight into risk management, threat mitigation, heartbleed impacts and more.
Be part of the industry's top thought-leadership event. Learn more about solving your most complex operational challenges through our game-changing products, solutions, and services. Participate in powerful networking throughout the event.
Join industry experts and ENISA (the European Union Agency for Network and Information Security) in a pan-European dialogue on ICS (Industrial Control Systems) Cybersecurity. High-quality presentations, lively discussions and hands-on workshops address today’s issues and tomorrow’s solutions in securing industrial control systems and critical infrastructure.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
This course provides a detailed look at how the ANSI/ISA-62443 (formerly ISA99) standards can be used to protect your critical control systems. It also explores the procedural & technical differences between the security for traditional IT environments & those solutions appropriate for SCADA or plant floor environments.