FEATURED ARTICLESin Cyber Security
Are You Managing Your Security Risks?
By Doug Wylie, Rockwell Automation
The stark reality in our contemporary digital, connected world is that there can be no absolute security....
Top Questions on Securing the IoT
By Mike Hannah, Rockwell Automation
Standards are critical to realize the promise of the IoT. Without standards, digital devices won’t...
An end-to-end approach is needed for IoT device security
Embedded Computing Design
By Vish Pai, Ayla Networks
Data must be secured from the time it leaves the end device or appliance, throughout its...
Wireless intrusion detection systems and wireless attacks
By Daniel E. Capano
A wireless intrusion detection system (WIDS) is a software algorithm designed to monitor the wireless...
NEWSin Cyber Security
- Innovasic announces TILE In-Line Security
- Cloud Security Market Expected to Reach US$ 11.84 Bn by 2022 Globally
- Cyber Security Market to See 11.84% CAGR Through 2019
- Global Security Testing market to grow 13.46 percent through 2019
- Industry IT security shortfalls persist
- SCADA Attacks Double in 2014
- Honeywell opens Cyber Security Lab in Georgia
- Cybersecurity Preparedness Doesn’t Measure Up
- A stepped approach to securing automation systems
- The Need for Efficient Cybersecurity Innovations is Evident in Every Sector
- Four companies form Industry 4.0 Consortium
- Honeywell to control oil and natural gas platform off Vietnam
PRODUCT NEWSin Cyber Security
Imagination introduces OmniShield SoC security
OmniShield is a scalable security technology that ensures that applications that need to be secure are effectively and reliably isolated from each...
Avotus updates ICM Enhanced Usage Reporting (EUR) platform
Enhancements include tracking and exception reporting to detect abuse and ensure compliance with corporate guidelines and regulatory requirements
Icon Labs introduces Floodgate Security Framework
Floodgate Security Framework (FSF) protects embedded devices and systems from cyber-attack.
MEDIAin Cyber Security
RESOURCESin Cyber Security
CFSE program for ICS offers CACE and CACS certifications
Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets
Fully interactive, role-based NERC CIP V5 Online Training Courses cover cyber security and access controls in the power industry.
WHITE PAPERSin Cyber Security
By Al Braik, Emirates Nuclear Energy Cooperation
Cyber Security design process and its implementation in the Nuclear Power ICS Architecture are...
By Anand Richard, Indiana State University
The only successful way to evade hacking is to constantly change the way a networked system or...
By Alan Grau, Icon Labs
The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or...
CASE STUDIESin Cyber Security
Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted...
EVENTSin Cyber Security
Industrial engineers can learn essential information about today’s ever-changing cyber threats at the mGuard User Conference 2015, June 2-4 in Houston. The free conference, sponsored by Innominate and Phoenix Contact, will include discussions and demonstrations of cyber security and remote connectivity applications in various industries.
The Modern Solutions Power Systems Conference (MSPSC) is a three-day event that focuses on discovering interdisciplinary solutions to the important issues affecting utility and industrial power systems including cybersecurity, safety and maintenance.
This event will provide power generation industry leaders with information on the latest innovations in controls, instrumentation, cyber security, SmartGrid, regulatory issues and variable energy technologies, which impact the power generation delivery systems.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...