FEATURED ARTICLESin Cyber Security
How Network Segmentation Improves Operational Security For Pipelines
Pipeline & Gas Journal
By Kenneth Tom, Wurldtech
Network segmentation is a fundamental component of cybersecurity, yet it is so difficult to...
RTU And Process Security From The Ground Up
Pipeline & Gas Journal
By Kevin L. Finnan
ISA/IEC 62443 classifies RTU installations at the local level as control zones. It is conceivable that...
Beyond the Secure RTOS– Protecting Wirelessly Connected Endpoints from Cyber-attacks
By Alan Grau, Icon Labs
About seventy percent of cyber-attacks target the application...
Scada security – more holes than a leaky bucket?
South African Instrument & Control
By Andrew Ashton
Antivirus systems typically respond to known attack vectors, not zero-day exploits. Campaigns...
NEWSin Cyber Security
- Cybersecurity Preparedness Doesn’t Measure Up
- A stepped approach to securing automation systems
- The Need for Efficient Cybersecurity Innovations is Evident in Every Sector
- Four companies form Industry 4.0 Consortium
- Honeywell to control oil and natural gas platform off Vietnam
- Bah humbug!
- Team8 cybersecurity research lab starts up
- Matrikon OPC UA Embedded SDK Certified Secure
- Yokogawa and Cisco Deliver Cybersecurity Solutions for Shell
- Icon Labs security software works with Mentor RTOS
- Malware targets manufacturers
- Security and Safety Becoming Big Business
PRODUCT NEWSin Cyber Security
Lynx Software Supports ARM-based processors
LynxSecure separation kernel hypervisor and LynxOS 7.0 RTOS support ARM Cortex-A series of processor cores, including processors from Xilinx, TI...
Belden updates security on WLAN Software
Enhancements to Hirschmann HiLCOS 9.0 Software include security features and simpler deployment for industrial networks.
Emerson releases cybersecurity services for control systems
Portfolio of cybersecurity services help Ovation control system customers in the power industry secure their cyber assets and meet compliance...
MEDIAin Cyber Security
RESOURCESin Cyber Security
CFSE program for ICS offers CACE and CACS certifications
Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets
Fully interactive, role-based NERC CIP V5 Online Training Courses cover cyber security and access controls in the power industry.
WHITE PAPERSin Cyber Security
By Anand Richard, Indiana State University
The only successful way to evade hacking is to constantly change the way a networked system or...
By Alan Grau, Icon Labs
The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or...
By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand...
CASE STUDIESin Cyber Security
Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted...
EVENTSin Cyber Security
Join the Middle East’s IT security experts and address issues around how to avoid cyber espionage and data theft, ensuring real-time response, and aligning the IT security framework with global frameworks.
HANNOVER MESSE 2015 covers all the core themes of the industrial value-adding chain at a single location – from individual components to the complete smart factory.
ACI’s Hydrocarbon Cyber Security Summit taking place on 15th & 16th April in London, UK will bring together key actors from both Oil & Gas majors and Technology industries, to discuss the challenges and opportunities of current systems.
TRAININGin Cyber Security
This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.
Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...
Understanding how to secure factory automation, process control, and Supervisory Control and Data Acquisition (SCADA) networks is critical if you want to protect them from viruses, hackers, spies, and saboteurs. This seminar teaches you the basics of the ISA/IEC 62443 standards and how these can be applied in the typical factory or plant.