Cyber Security 


view all


in Cyber Security
  • InfinityQS publishes book debunking Cloud Computing Myths

    Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE

  • Green Hills Software Announces Security Advisors Program

    IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE

  • Siemens Introduces Managed Security Service

    Service includes assessment of security posture, implementation of recommended security measures and transitions into ongoing defense against cyber... MORE

  • view all


    in Cyber Security
  • Enterprise IoT Security Challenges Facing Industrial Automation 
    Enterprise IoT Security Challenges Facing Industrial...

    By Cormac Garvey, HAL Software
    Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand... MORE

  • Securing Industrial Embedded devices 
    Securing Industrial Embedded devices

    By Mahesh Subrmaniam, HCL
    Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded... MORE

  • Windows XP End of Service: Practical Options for Industrial Applications 
    Windows XP End of Service: Practical Options for...

    By Belden
    Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE

  • view all


    in Cyber Security
  • Axis thermal network cameras provide security for a solar field 
    Axis thermal network cameras provide security for a solar...

    With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted... MORE

  • Multivac uses remote service to keep packaging machines running 
    Multivac uses remote service to keep packaging machines...

    Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE

  • Network Management Put to the Test 
    Network Management Put to the Test

    Automation World
    The largest control network built in one phase in the Middle East is for the Qatalum aluminum smelter plant. Managing the more... MORE

  • view all


    in Cyber Security
    September 29, 2014 - September 30, 2014
    London , United Kingdom

    Key European and International Energy, Government and Cyber Security leaders meet in London for an exclusive two day conference to address growing and persistent threats to Critical National infrastructure. This two day networking and information sharing event will provide specific insight into risk management, threat mitigation, heartbleed impacts and more.

    September 30, 2014 - October 2, 2014
    Orlando , FL, USA

    Be part of the industry's top thought-leadership event. Learn more about solving your most complex operational challenges through our game-changing products, solutions, and services. Participate in powerful networking throughout the event.

    October 1, 2014
    Heidelberg , Germany

    Join industry experts and ENISA (the European Union Agency for Network and Information Security) in a pan-European dialogue on ICS (Industrial Control Systems) Cybersecurity. High-quality presentations, lively discussions and hands-on workshops address today’s issues and tomorrow’s solutions in securing industrial control systems and critical infrastructure.

    view all


    in Cyber Security
    July 1, 2013 - June 30, 2015
    Online , KS, USA

    This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.

    October 14, 2014 - October 15, 2014
    Morristown , NJ, USA

    This course provides a detailed look at how the ANSI/ISA-62443 (formerly ISA99) standards can be used to protect your critical control systems. It also explores the procedural & technical differences between the security for traditional IT environments & those solutions appropriate for SCADA or plant floor environments.