Articles & News on Connectivity & Cybersecurity

The Challenge of OT Security in a Converged World

  • by Rick Peters, Fortinet
  • Feature

Absent an effective OT security plan, OT enterprise and their integrated ICS/SCADA systems are left vulnerable to cyberattacks that could result in financial loss, reputational damage, diminished consumer confidence, and even threaten the safety of citizens—and in the case of critical infrastructures, also threaten national security.

FDT 3.0 Standard and Development Tools Now Available

  • by Lee Lane, FDT
  • Opinion

By Lee Lane, FDT Chairman of the Board of Directors
Created on the long legacy of the rock solid FDT standard, we now release the features and capabilities that are needed for IIoT, remote monitoring, mobility, and IT/OT integration.

How Field Tablets are Changing the Game in Instrumentation

  • by Fabrício Andrade, Endress+Hauser
  • Opinion

Device libraries have been a common problem for many field communicators, and the complicated update procedure has been a nightmare for many users. Vendors sometimes struggle to understand what really happens in the field, and the chat groups on WhatsApp prove that the challenges still exist out there.

PRM’s New Features Optimize Plant Maintenance

  • News

PRM centralizes management of large volumes of data from instrumentation and equipment.and fully supports communication standards such as HART, FOUNDATION fieldbus™ (FF-H1), PROFIBUS, PROFINET, ISA100 and FDT/DTM (Field Device Tool/Device Type Manager4) interface standards

FDT 3.0 Common Components Decrease Development Efforts and Increase Interoperability

  • by Manfred Brill, FDT
  • Opinion

The FDT ecosystem is evolving to incorporate modern web-based and mobile applications in the process, hybrid and discrete manufacturing markets.

Security at the Edge with Microsegmentation

  • by Courtney Schneider
  • Feature

The IIoT connects edge devices in OT networks directly to the Internet to enhance operational efficiencies. What confuses security designs for IIoT deployments is differing kinds of risk.

OPC Experts Interview:The Technology Behind OPC UA

  • by Michael Clark
  • Feature

Learn from an interview with Darek Kominek of Matrikon about the concepts of built-in security, the IT-OT gap, protecting against hacker/malware attacks, and many other features that have made OPC UA the secure data-exchange standard it is today. his is the third in the series of OPC Experts Interviews.

NCCoE announces 10 technology collaborators for Protecting Information and System Integrity in Industrial Control System Environments project

  • News

These collaborators will work with the NCCoE project team to provide a practical solution to help manufacturers protect their industrial control system(s) (ICS) from data integrity attacks.

Saratech announces acquisition of Apex Digital Manufacturing Solutions

  • News

Saratech will take over all of Apex's PLM software license and subscription sales, support services, and training classes.

Back to USB School

  • by Eric D. Knapp, Honeywell Connected Enterprise
  • Opinion

By Eric D. Knapp
USB attacks blur the line between a network threat and a local physical threat. The USB protocol essentially extends every one of our networks into something exponentially bigger.