Articles & News on Connectivity & Cybersecurity
- by Rick Peters, Fortinet
Absent an effective OT security plan, OT enterprise and their integrated ICS/SCADA systems are left vulnerable to cyberattacks that could result in financial loss, reputational damage, diminished consumer confidence, and even threaten the safety of citizens—and in the case of critical infrastructures, also threaten national security.
- by Lee Lane, FDT
By Lee Lane, FDT Chairman of the Board of Directors
Created on the long legacy of the rock solid FDT standard, we now release the features and capabilities that are needed for IIoT, remote monitoring, mobility, and IT/OT integration.
- by Fabrício Andrade, Endress+Hauser
Device libraries have been a common problem for many field communicators, and the complicated update procedure has been a nightmare for many users. Vendors sometimes struggle to understand what really happens in the field, and the chat groups on WhatsApp prove that the challenges still exist out there.
PRM centralizes management of large volumes of data from instrumentation and equipment.and fully supports communication standards such as HART, FOUNDATION fieldbus™ (FF-H1), PROFIBUS, PROFINET, ISA100 and FDT/DTM (Field Device Tool/Device Type Manager4) interface standards
- by Manfred Brill, FDT
The FDT ecosystem is evolving to incorporate modern web-based and mobile applications in the process, hybrid and discrete manufacturing markets.
- by Courtney Schneider
The IIoT connects edge devices in OT networks directly to the Internet to enhance operational efficiencies. What confuses security designs for IIoT deployments is differing kinds of risk.
- by Michael Clark
Learn from an interview with Darek Kominek of Matrikon about the concepts of built-in security, the IT-OT gap, protecting against hacker/malware attacks, and many other features that have made OPC UA the secure data-exchange standard it is today. his is the third in the series of OPC Experts Interviews.
NCCoE announces 10 technology collaborators for Protecting Information and System Integrity in Industrial Control System Environments project
These collaborators will work with the NCCoE project team to provide a practical solution to help manufacturers protect their industrial control system(s) (ICS) from data integrity attacks.
Saratech will take over all of Apex's PLM software license and subscription sales, support services, and training classes.
- by Eric D. Knapp, Honeywell Connected Enterprise
By Eric D. Knapp
USB attacks blur the line between a network threat and a local physical threat. The USB protocol essentially extends every one of our networks into something exponentially bigger.
Subscribe to our publications
Receive the latest automation content, sent to your inbox in the form of e-newsletters or ebooks. You pick the topics, we take care of the rest!Subscribe