FEATURED ARTICLESin Cyber Security
Cybersecurity: Who can hack it?
By Mike Bacidore
A defense-in-depth strategy is a must, but that’s just to keep out the riff raff. The first rule of...
Cyber security & peace of mind
Process & Control Engineering
By Matt McDonal
Cyber security needs to be taken seriously. And it is not just the high profile targeted attacks...
Cyber Breach Insurance for Manufacturer Loss Protection
By Bill Lydon, Editor
A single cyber security incident can lead to significant losses for any company. It is unclear to me and I am sure many...
Are You Managing Your Security Risks?
By Doug Wylie, Rockwell Automation
The stark reality in our contemporary digital, connected world is that there can be no absolute security....
NEWSin Cyber Security
- ISA introduces cybersecurity courses and certificate programs
- Honeywell to add McAfee to its security solutions
- Honeywell to supply automation and security to LNG terminal
- Weak password encryption used in Rockwell HMI software
- Cybersecurity, ISA, and Automation Federation and how we got here
- Automation Federation releases remote access report
- NIST Updates Industrial Control Systems Security Guide
- Innovasic announces TILE In-Line Security
- Cloud Security Market Expected to Reach US$ 11.84 Bn by 2022 Globally
- Cyber Security Market to See 11.84% CAGR Through 2019
- Global Security Testing market to grow 13.46 percent through 2019
- Industry IT security shortfalls persist
PRODUCT NEWSin Cyber Security
Siemens releases Scalance S615 security module
Scalance S615 security module has five Ethernet ports that offer protection for various network topologies via firewall or virtual private network...
Imagination introduces OmniShield SoC security
OmniShield is a scalable security technology that ensures that applications that need to be secure are effectively and reliably isolated from each...
Avotus updates ICM Enhanced Usage Reporting (EUR) platform
Enhancements include tracking and exception reporting to detect abuse and ensure compliance with corporate guidelines and regulatory requirements
MEDIAin Cyber Security
RESOURCESin Cyber Security
The license for Phoenix Contact’s FL mGuard security devices can protect OPC Classic applications.
CFSE program for ICS offers CACE and CACS certifications
Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets
WHITE PAPERSin Cyber Security
By Tempered Networks
White paper describes the Tempered Networks solution, a network segmentation product based on the International Society of...
By Al Braik, Emirates Nuclear Energy Cooperation
Cyber Security design process and its implementation in the Nuclear Power ICS Architecture are...
By Anand Richard, Indiana State University
The only successful way to evade hacking is to constantly change the way a networked system or...
CASE STUDIESin Cyber Security
Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...
The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...
With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted...
EVENTSin Cyber Security
As Technology advances, Cyber threats can have high impact on overall operation and business of organizations. ICS cyber security can't just be left on IT department to fend the security wall. With the growing volume and sophistication of cyber attacks,
SGTech Europe 2015 is the premier implementation focused smart grid technical conference in Europe, with focused tracks on Smart Substations, Next Generation SCADA, Packet Telecoms, and Cyber-Security.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.
TRAININGin Cyber Security
Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...
Seminar on Cyber Security - How to fortify your organization