Cyber Security 


view all


in Cyber Security
  • Phoenix Contact offers license for mGuard firmware 
    Phoenix Contact offers license for mGuard firmware

    The license for Phoenix Contact’s FL mGuard security devices can protect OPC Classic applications.

  • Exida certifies Cybersecurity Personnel

    CFSE program for ICS offers CACE and CACS certifications

  • Moxa releases free firmware for Multiport Router 
    Moxa releases free firmware for Multiport Router

    Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets

  • view all


    in Cyber Security
  • A New Approach to Safeguarding Your Industrial Control Systems and Assets 
    A New Approach to Safeguarding Your Industrial Control Systems and Assets

    By Tempered Networks
    White paper describes the Tempered Networks solution, a network segmentation product based on the International Society of...

  • Cyber Security Design Methodology for Nuclear Power Control & Protection Systems 
    Cyber Security Design Methodology for Nuclear Power Control & Protection Systems

    By Al Braik, Emirates Nuclear Energy Cooperation
    Cyber Security design process and its implementation in the Nuclear Power ICS Architecture are...

  • Stuxnet Proofing Shop Floors 
    Stuxnet Proofing Shop Floors

    By Anand Richard, Indiana State University
    The only successful way to evade hacking is to constantly change the way a networked system or...

  • view all


    in Cyber Security
  • Innominate secures remote maintenance for FRIMO 
    Innominate secures remote maintenance for FRIMO

    FRIMO has integrated 80 remote service connectivity solutions. Using VNC (virtual network computing) software, the entire screen content of the...

  • The Anatomy of a Cyber Security Assessment 
    The Anatomy of a Cyber Security Assessment

    Design News
    By Rob Speigel
    Over the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works...

  • Faceware Technologies software protected by CodeMeter

    Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...

  • view all


    in Cyber Security
    October 5, 2015 - October 7, 2015
    Montevideo , Uruguay

    The IEEE PES Conference on Innovative SMART GRID Technologies (ISGT-LA 2015) Latin American, sponsored by the IEEE Power & Energy Society (PES) and hosted by IEEE URUGUAY SECTION and PES local CHAPTER, will be held on OCT 5, 6 and 7th, 2015.

    October 12, 2015 - October 13, 2015
    Sacramento , CA, United States

    All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.

    February 8, 2016 - February 11, 2016
    Orlando , FL, USA

    Join us at the 20th annual ARC Industry Forum to learn more about how this industrial transformation will unfold. Discover what other companies are doing today to prepare for the new age of industrial innovation and how they expect to improve their business performance by doing so.

    view all


    in Cyber Security
    January 5, 2015 - December 31, 2015
    Mississauga , ON, Canada

    Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...

    October 7, 2015

    Get trained on operations and functions that cyber security is performing in the business environment, How to choose a Security, uses of cyber security.

    November 17, 2015
    Houston , TX, United States

    In the first part of this Technology Tuesday session, you will learn how to leverage the latest technologies in “the Cloud” to better support your customers. The second half of the session revisits plant-level cyber security and discusses technologies to help boost your defense-in-depth.