FEATURED ARTICLESin Cyber Security
Plant floor cyber security—is it on your agenda?
By Keith Campbell
Plant floor cyber security is among today’s most serious threats facing our individual manufacturing...
Securing edge devices and data in industrial applications
South African Instrumentation and Control
By Johnny Fang, Moxa
The Trusted Platform Module, or TPM. defines a hardware standard that permanently...
Seven best practices for wireless cyber security
By Daniel E. Capano
A good, solid understanding of effective cyber security is needed to protect information in a world where...
Security for wireless instrumentation
By Jeff Melrose
Wireless instruments and other field devices offer huge advantages in the right applications, but there are...
NEWSin Cyber Security
- Cloud Security Market Expected to Reach US$ 11.84 Bn by 2022
- ISA introduces enhanced suite of integrated industrial cybersecurity courses and certificate programs
- Enhanced security due to two-factor authentication
- SCADA cyber security
- Bedrock Automation joins ISA Security Compliance Institute
- Global Physical Security Market: Converging Physical and IT Security System to Open New Opportunities
- Update on the NIST Cybersecurity Framework
- US Offshore O&G needs cybersecurity solutions
- ISA introduces cybersecurity courses and certificate programs
- Honeywell to add McAfee to its security solutions
- Honeywell to supply automation and security to LNG terminal
- Weak password encryption used in Rockwell HMI software
PRODUCT NEWSin Cyber Security
Ultra Electronics adds DNP3 to CyberFence security software
The capability dynamically inspects and validates all DNP3 communications, adding previously unavailable security to counter vulnerable pathways in...
Icon Labs Releases Security Management System
Floodgate Security Manager provides security for IoT edge devices, including mobile, wireless, battery powered and mesh-based IoT sensors.
Phoenix Contact releases two secure routers
mGuard RS2004 and RS2005 combine secure routing, VPN, and firewall functions with network switch capabilities.
MEDIAin Cyber Security
RESOURCESin Cyber Security
The license for Phoenix Contact’s FL mGuard security devices can protect OPC Classic applications.
CFSE program for ICS offers CACE and CACS certifications
Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets
WHITE PAPERSin Cyber Security
By Tempered Networks
White paper describes the Tempered Networks solution, a network segmentation product based on the International Society of...
By Al Braik, Emirates Nuclear Energy Cooperation
Cyber Security design process and its implementation in the Nuclear Power ICS Architecture are...
By Anand Richard, Indiana State University
The only successful way to evade hacking is to constantly change the way a networked system or...
CASE STUDIESin Cyber Security
By Rob Speigel
Over the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works...
Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...
EVENTSin Cyber Security
As Technology advances, Cyber threats can have high impact on overall operation and business of organizations. ICS cyber security can't just be left on IT department to fend the security wall. With the growing volume and sophistication of cyber attacks,
For more than 10 years the EnergySec Security Summit has been the premier gathering for stakeholders in the energy sector focused on Industrial Control System (ICS) physical and cyber security. Our summits give each attendee a rare opportunity to mingle with asset owners, government agencies, researchers, consultants, vendors and academia under one roof.
SGTech Europe 2015 is the premier implementation focused smart grid technical conference in Europe, with focused tracks on Smart Substations, Next Generation SCADA, Packet Telecoms, and Cyber-Security.
TRAININGin Cyber Security
Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...