Cyber Security 

FEATURED PRODUCTS

view all

RESOURCES

in Cyber Security
  • Exida certifies Cybersecurity Personnel

    CFSE program for ICS offers CACE and CACS certifications

  • Moxa releases free firmware for Multiport Router 
    Moxa releases free firmware for Multiport Router

    Free EDR-810 firmware lets network administrators implement firewall security without time-consuming re-configuring of network subnets

  • Global Training Offers Online Cybersecurity Courses

    Fully interactive, role-based NERC CIP V5 Online Training Courses cover cyber security and access controls in the power industry.

  • view all

    WHITE PAPERS

    in Cyber Security
  • Stuxnet Proofing Shop Floors 
    Stuxnet Proofing Shop Floors

    By Anand Richard, Indiana State University
    The only successful way to evade hacking is to constantly change the way a networked system or...

  • The Internet of Secure Things 
    The Internet of Secure Things

    By Alan Grau, Icon Labs
    The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or...

  • Enterprise IoT Security Challenges Facing Industrial Automation 
    Enterprise IoT Security Challenges Facing Industrial Automation

    By Cormac Garvey, HAL Software
    Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand...

  • view all

    CASE STUDIES

    in Cyber Security
  • Faceware Technologies software protected by CodeMeter

    Since implementing CodeMeter protection, Faceware Technologies has not detected any counterfeit copies of the current software release on the open...

  • Wolffkran employs INSYS  for IP-based remote maintenance  
    Wolffkran employs INSYS for IP-based remote maintenance

    The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN...

  • Axis thermal network cameras provide security for a solar field 
    Axis thermal network cameras provide security for a solar field

    With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted...

  • view all

    EVENTS

    in Cyber Security
    March 29, 2015 - April 1, 2015
    Abu Dhabi , United Arab Emirates


    Join the Middle East’s IT security experts and address issues around how to avoid cyber espionage and data theft, ensuring real-time response, and aligning the IT security framework with global frameworks.

    April 13, 2015 - April 17, 2015
    Hannover , Germany


    HANNOVER MESSE 2015 covers all the core themes of the industrial value-adding chain at a single location – from individual components to the complete smart factory.

    April 15, 2015 - April 16, 2015
    London , CO, UK


    ACI’s Hydrocarbon Cyber Security Summit taking place on 15th & 16th April in London, UK will bring together key actors from both Oil & Gas majors and Technology industries, to discuss the challenges and opportunities of current systems.

    view all

    TRAINING

    in Cyber Security
    July 1, 2013 - June 30, 2015
    Online , KS, USA


    This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.

    January 5, 2015 - December 31, 2015
    Mississauga , ON, Canada


    Global Training Solutions Inc. of Mississauga, Ontario, Canada is now offering the North American Power Industry, fully interactive, role-based NERC CIP V5 Online Training Courses. CIP V5 Courses Include: Base Training – Cyber Security; Information Handling; Electronic Access Controls; Physical Access Controls (Includes Visitor Management); Cyber Security Incidents, Response and Recovery. ...

    April 2, 2015
    Anchorage , AK, United States


    Understanding how to secure factory automation, process control, and Supervisory Control and Data Acquisition (SCADA) networks is critical if you want to protect them from viruses, hackers, spies, and saboteurs. This seminar teaches you the basics of the ISA/IEC 62443 standards and how these can be applied in the typical factory or plant.