Archive | Cybersecurity

industrial-automation-and-control-system-security-principles-second-edition-04

Q&A with Author of New Edition of ISA Book on Industrial Cybersecurity Plus Sample Chapter

Q. Why were you compelled to publish an updated edition? What differentiates the second edition from the initial version? A. I wanted to cover the latest thinking and approaches to industrial automation and control system (IACS) security.  This new edition addresses the most recent, formal methods and their practical applications to IACS security.  The book […]

Continue Reading · 0
industrial-automation-security-cybersecurity

How to Improve Industrial Automation Security

The history of industrial automation fascinates me. Continuous innovation and new technologies have taken manufacturing processes that originated in the Industrial Age and catapulted them straight into the information age. Just as productivity seemed to be topping out, the Internet helped boost productivity and efficiency to previously unimaginable levels. Unfortunately, as industrial automation roared into […]

Continue Reading · 0
remotely-managed-industrial-automation-cybersecurity

Remotely Managed Industrial Automation Cybersecurity

Epic Turla, Regin, and BlackEnergy are the names of just a few in a series of recent malware discoveries that target industrial automation control systems (IACS). The increasing volume and sophistication of these types of threats has driven the topic of operational technology security all the way up to the corporate boardroom. Unfortunately, the attack […]

Continue Reading · 0
cybersecurity-municipal-infrastructure

Is There Enough Focus on Cybersecurity for Municipal Infrastructure?

The volumes of information written about cybersecurity can be mind-boggling. The subject has important implications for everyone, especially for those of us involved with industrial control systems and software-based automation of water, sewer and electric systems. Legacy control systems have always been vulnerable because they weren’t designed with cyber attacks in mind. They were designed […]

Continue Reading · 0
industrial-security-2

Webinar Recording: How to Build Reliable Industrial Control Systems

I am always pleased to share operationally sound methods for deeply layering security, and I frequently demonstrate live hacks that illustrate how exploits can be countered undetectably to hackers once they’ve breached the firewall — as they inevitably will. Recently I had the opportunity to team with an expert security researcher to investigate new capabilities […]

Continue Reading · 0
Dollarphotoclub_77940884

ISA Strengthens its Position as a Leader in Industrial Automation and Control Systems Cybersecurity

Results of a recent survey by the Pew Research Center, canvassing more than 1,600 leading experts on the Internet and computer systems and networks, predicted that a major industrial cyberattack will occur sometime within the next 10 years that will cause widespread harm to America’s security and welfare. “Widespread harm” was defined as significant loss […]

Continue Reading · 0
Print

Managing Industrial Control System Cybersecurity

The purpose of industrial control system (ICS) cybersecurity is to ensure that the industrial process performs safely and as expected. It should only perform at the right time, for the right people, and for the purposes for which it was designed. Anything outside those conditions is often considered a cybersecurity incident. Small improvements to the […]

Continue Reading · 0
May-Jun-INT-Cover-story_slider

Top 10 Differences Between ICS and IT Cybersecurity

In many, if not most plants with industrial control systems (ICS), ICS engineers and their internal information technology (IT) counterparts have very different perspectives on cybersecurity. Not surprisingly, these different perspectives often lead to conflicts when connecting an ICS to the plant’s IT system. In the past, because industrial control systems used proprietary hardware and […]

Continue Reading · 0
MA-2014_proc-auto-interchange_blog

Bolster Security for Your Legacy OPC Server

If you currently have an OPC server, you can quickly and easily overcome its security shortcomings and difficulties by wrapping it with OPC .NET, which combines Microsoft .NET security with access control features. It provides a simple method to secure access to legacy OPC servers. OPC .NET, originally called OPC Xi, is a Microsoft .NET […]

Continue Reading · 0

Pin It on Pinterest