Cookie Consent
This site uses cookies to store information on your computer. Without consent certain enhanced features will not be available and future visits may require repeated consent, so it is recommended to accept the use of cookies. Visit the Automation.com Privacy Policy for more information.Software Toolbox News & Articles

Five Key Considerations for Your Own OPC UA Security Architecture
- by Kevin Rutherford
- February 2, 2022
- Feature
Although the list of considerations to evaluate when planning the design for a secure OPC UA architecture is considerably longer than what is discussed here, these offer a starting point to drive a conversation within your organization to ensure a system that meets the unique requirements of your project.

Difficult Conversations: Open Ports, Business Data Needs, and Cybersecurity Risk
- by Win Worrall
- February 4, 2021
- Feature
In this article we share with readers in the OT space the terminology, concepts and IT perspectives we’ve learned to help them have collaborative discussions with IT, to weigh risks together, evaluate options to address risks, and accomplish movement of data for operational & business needs.