Cybersecurity - View All Whitepapers

Cybersecurity

Industrial Internet Consortium (IIC) announces Managing and Assessing Trustworthiness for IIoT in Practice white paper
July 29, 2019

Industrial Internet Consortium (IIC) announces Managing and Assessing Trustworthiness for IIoT in Practice white paper

The white paper’s best-practice approach to managing trustworthiness is comprised of four phases: baselining the system, analyzing potential trustworthiness events, implementing trustworthiness targets and governance, and iterating and maintaining the resulting trustworthiness model.

Data Protection Best Practices
July 22, 2019

Data Protection Best Practices

By Industrial Internet Consortium
Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems.

A Case for IIoT’s Future in Supply Chain Management
April 18, 2019

A Case for IIoT’s Future in Supply Chain Management

By Vega
This paper will explore how one construction materials hauling company used level measurement sensors and IIoT networks to better manage their operation

Open Industry 4.0 Alliance Technical Solution Design Principles
April 12, 2019

Open Industry 4.0 Alliance Technical Solution Design Principles

By The Open Industry 4.0 Alliance,
This white paper is focused on helping readers understand in detail the Open Industry 4.0 solution reference architecture framework for interoperability. It provides a dive deep into key design principles of its members defined and supported end to end solutions

How Will the PLC Market be Impacted by the Manufacturing Slowdown?
March 12, 2019

How Will the PLC Market be Impacted by the Manufacturing Slowdown?

By Tim Dawson, Interact Analysis
With the manufacturing sector facing a bleak outlook in 2019, this paper shares projections for the growth and development of the programmable logic controller (PLCs) market in key countries and industries

Guide to Saving Time with Intelligent Data Logging
September 20, 2018

Guide to Saving Time with Intelligent Data Logging

By CAS Dataloggers
With advances in technology and computing power, modern data loggers can reduce the amount of time and effort required to extract critical information. These "intelligent" data loggers incorporate several features that allow them to go well beyond the functionality of a traditional data logger to help zero in on what the user is looking for

What's the Use of the IIoT?
July 10, 2018

What's the Use of the IIoT?

By Radley Corporation
The IIoT connects devices with the digital world to provide data visibility. But the real value of the IIoT lies in how that data will be used by industry to realize the potential benefi ts of this connectivity.

What do Industrial Engineers Need to Know About Functional Safety?
June 29, 2018

What do Industrial Engineers Need to Know About Functional Safety?

By Scott Orlosky and Jean-Marc Hubsch, Sensata Technologies
Engineers designing systems for industrial and factory applications are adopting functional safety design practices to reduce the risk of system failures that could result in costly damage or injury.

Sharing Industrial Cybersecurity Guidance Across Sectors
May 25, 2018

Sharing Industrial Cybersecurity Guidance Across Sectors

By Eric C. Cosman, ARC Advisory Group
Recently, there have been several efforts to apply and adapt standards developed for one sector or industry to others. ARC Advisory Group expects this trend to continue as industry groups, suppliers, and asset owners strive to optimize their response.

Bridging the IT/OT Divide
May 22, 2018

Bridging the IT/OT Divide

By Weintek
Today’s smarter edge devices can streamline integration efforts while providing secure remote access for end users and machine builders, too

Exploring Security by Design
April 06, 2018

Exploring Security by Design

By Siegfried Müller, MB Connect Line
Nowadays it‘s difficult to imagine that a new appliance will be developed without a safety risk analysis, or by using safety elements without corresponding certifications. In fact, standards and norms regulate how security components have to be designed and deployed. Within information technology, such regulations don‘t exist yet.

IIC Endpoint Security Best Practices
March 14, 2018

IIC Endpoint Security Best Practices

This white paper from the Industrial Internet Consortium recommends best practices for endpoint security in industrial applications under the broader scope of industrial internet security. The basis for this document is the detailed analysis in the various industrial guidance and compliance frameworks that already exist

Overcoming Cybersecurity Challenges in Industrial Control Systems
February 23, 2018

Overcoming Cybersecurity Challenges in Industrial Control Systems

By Veracity
Holistic challenges such as ICS cybersecurity can be overwhelming. Security solutions often create more challenging system-wide issues. Attacking comprehensive problems with individual statements helps us to focus on solving analysis and planning issues step by step. This paper identifies two individual problem statements that address the comprehensive issue of ICS security.

Calibration Essentials: An ISA and Beamex eBook
February 16, 2018

Calibration Essentials: An ISA and Beamex eBook

The calibration experts at Beamex have teamed with the International Society of Automation (ISA) to provide this in-depth guide to calibration automation, complete with all the information you need to ensure a fully calibrated and reliable facility.

A New Deal for Buildings
February 02, 2018

A New Deal for Buildings

This whitepaper discusses ways to facilitate the adoption of information technologies in order to enable a more productive indoor environment.

Bedrock Automation releases ICS Cyber Security Best Practices white paper
January 18, 2018

Bedrock Automation releases ICS Cyber Security Best Practices white paper

The 20-page document, Securing Industrial Control Systems - Best Practices, covers the threat landscape and presents a holistic approach to defending it, including assessing risk, physical security, network security, workstation and server security, as well as the fundamentals of OSA.

Secure Configuration and Operation of OPC UA
December 18, 2017

Secure Configuration and Operation of OPC UA

The OPC Foundation published a set of practical guidelines for the secure configuration and use of OPC UA in industry.  This brochure helps readers quickly understand what OPC UA security has to offer and how to best use it. 

Powering Automatic Teller Machines One Board at a TIme
August 01, 2017

Powering Automatic Teller Machines One Board at a TIme

By AAEON
In 2014, China overtook the USA and became the world’s largest ATM market, according to Retail Banking Research (RBR), a financial strategy and data consultancy headquartered in London.

Industrial Cybersecurity for Small- and Medium-Sized Businesses:  A Practical Guide
July 28, 2017

Industrial Cybersecurity for Small- and Medium-Sized Businesses: A Practical Guide

Effective cybersecurity management is essential for all organizations, regardless of size. This ISA document is intended to provide a starting point for small- and medium-businesses (SMBs), particularly those that manage industrial processes and employ some level of automation.

Protecting the Connected Barrels:  Cybersecurity for upstream oil and gas
July 05, 2017

Protecting the Connected Barrels: Cybersecurity for upstream oil and gas

By Anshu Mittal, Andrew Slaughter, Paul Zonneveld
This Deloitte report addresses cybersecurity concerns in the oil & gas industry, and discusses how companies can better protect themselves in an increasingly connected world.

Cybersecurity: Going Beyond Protection to Boost Resiliency
June 28, 2017

Cybersecurity: Going Beyond Protection to Boost Resiliency

By Don Dickinson, Phoenix Contact USA
The challenge of protecting sensitive data and cyber-assets becomes even more daunting as tens of billions of devices are connected globally, creating the Internet of Things (IoT). Cyber-threats take on an even greater significance when the target is critical infrastructure.

The Race to A Digital Future: Assessing digital intensity in US manufacturing
June 13, 2017

The Race to A Digital Future: Assessing digital intensity in US manufacturing

This Siemens research report evaluates manufacturers’ digital capabilities across several core dimensions, using their relative progress in each to provide an overall score out of 100, determining what progress manufacturers still have to make in order to access the digital future

Why PKI matters for the IIoT
May 23, 2017

Why PKI matters for the IIoT

By Alan Grau and Dave West, Icon Labs
Just as cyber-attacks take many forms and exploit a wide range of vulnerabilities in the target device, so too is cybersecurity multi-faceted. A fundamental, but often ignored, aspect of cybersecurity for IIoT devices is strong authentication.

What is a Cloud  Serialization and  Traceability Solution?
April 05, 2017

What is a Cloud Serialization and Traceability Solution?

The core principles of a Level 4 system make it uniquely positioned to deliver data sharing capability up, down, and across the supply chain.

Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production
March 27, 2017

Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production

This new Deloitte study outlines the strategies that businesses must take to build cybersecurity efforts into their larger business plan and untimely protect their operations and their customers.

Digitalization 101: The Means to a Successful Enterprise Outcome
March 17, 2017

Digitalization 101: The Means to a Successful Enterprise Outcome

By Rajiv Sivaraman, Siemens
Digitalization may find its way into the dictionary as a homonym, for all its multiple meanings, but it has already found its way into boardroom agenda. Are you on board with digitalization?

Powering the Internet of Things with MQTT
January 06, 2017

Powering the Internet of Things with MQTT

By Ming Fong, Schneider-Electric Software
Even though MQTT was designed prior to this age of IoT, its characteristics meet the requirements of IoT and have full advantage of being adopted into the IoT space. This paper provides an insight into the MQTT protocol.

Protecting Industrial Control Systems: An Integrated Approach
October 20, 2016

Protecting Industrial Control Systems: An Integrated Approach

By RKNeal, Inc.
The purpose of this whitepaper is to present a novel cybersecurity framework for deploying and managing cyberthreat management products across multiple OEM vendors.

Device Security for the IIoT
September 07, 2016

Device Security for the IIoT

By Icon Labs and Renesas
A deep-dive guide for design engineers developing networked and web-connected equipment and solutions, this new white paper outlines security requirements for Industrial Internet of Things (IIoT) devices and software solutions that are available today for securing these devices.

Eight Tips to Optimize Your Industrial Wireless Network
August 03, 2016

Eight Tips to Optimize Your Industrial Wireless Network

By Moxa
An effective communication infrastructure can make it possible for industrial equipment to deliver high levels of reliability, availability, and maintainability, thereby reducing operational and support costs, and minimizing capital investments.

Posted in:
Smarter Security for Manufacturing in the Industry 4.0 Era
July 14, 2016

Smarter Security for Manufacturing in the Industry 4.0 Era

While Industry 4.0 and the Industrial Internet of Things have brought agility and flexibility to manufacturing, it has also brought a host of cybersecurity concerns. This whitepaper discusses the best practices for securing your systems

Virtualizing Your Network: Benefits and Challenges
May 27, 2016

Virtualizing Your Network: Benefits and Challenges

This white paper is not a prescriptive guide to network virtualization, rather it is a high-level overview focused on the benefits and challenges of network virtualization.

Deploying Identity Services within a Converged Plantwide Ethernet Architecture
December 03, 2015

Deploying Identity Services within a Converged Plantwide Ethernet Architecture

By Cisco and Rockwell Automation
White paper introduces an approach to security policy enforcement that tightly controls access by anyone inside the plant, whether they’re trying to connect via wired or wireless devices.

Posted in:
Posted in: 
White Papers
Related Portals:
Industrial Networks, EtherNet/IP, Cybersecurity
Securely Share Plant and Enterprise Data
November 23, 2015

Securely Share Plant and Enterprise Data

By Cisco and Rockwell
Many manufacturers segment business-system networks from plantwide networks by using an industrial demilitarized zone (IDMZ). But once segmented, how is data from industrial automation and control systems (IACS) securely shared across this buffer zone? Here's how.

Posted in:
Posted in: 
White Papers
Related Portals:
Industrial Networks, Cybersecurity
A New Approach to Safeguarding Your Industrial Control Systems and Assets
June 03, 2015

A New Approach to Safeguarding Your Industrial Control Systems and Assets

By Tempered Networks
White paper describes the Tempered Networks solution, a network segmentation product based on the International Society of Automation (ISA) TR100.15.01 architecture. The solution is used to create private overlay networks on top of shared network infrastructure. The Tempered Networks solution provides the enterprise with “Private Networks as a Service.”

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems
May 11, 2015

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems

By Al Braik, Emirates Nuclear Energy Cooperation
Cyber Security design process and its implementation in the Nuclear Power ICS Architecture are explained. A complete Nuclear Power ICS cyber security life cycle program is described and how the Defense In Depth approach is sequenced in this life cycle is explained.

Stuxnet Proofing Shop Floors
December 17, 2014

Stuxnet Proofing Shop Floors

By Anand Richard, Indiana State University
The only successful way to evade hacking is to constantly change the way a networked system or computing components are used. Changing network architecture, usage policies and rationing internet connectivity to an absolute minimum and to an ad-hoc formula will make a hacker’s job more difficult.

The Internet of Secure Things
November 05, 2014

The Internet of Secure Things

By Alan Grau, Icon Labs
The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the Internet. Until recently, security has not been a high priority for these devices. It is now time to establish The Internet of Secure Things.

Enterprise IoT Security Challenges Facing Industrial Automation
August 06, 2014

Enterprise IoT Security Challenges Facing Industrial Automation

By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand basic IT security. However, guidance from the industrial automation industry is fragmented and scant in regard to improving cyber security of control systems. lndustrial cyber security experts are peddling their rehashed wares, trying to cash in on clients fears, ‘Y2K’ style. Here’s a look at the standards, efforts and problems with industrial cybersecurity.

Securing Industrial Embedded devices
July 15, 2014

Securing Industrial Embedded devices

By Mahesh Subrmaniam, HCL
Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded device development--specifically embedded devices that are networked, so the device is compliant with standards on cyber security.