Top 10 Differences Between ICS and IT Cybersecurity

Top 10 Differences Between ICS and IT Cybersecurity

This post was written by by Lee Neitzel, senior engineer at Emerson Process Management and Bob Huba, system security architect at Emerson.  In many, if not most plants with industrial control systems (ICS), ICS engineers and their internal information technology (IT)...
Bolster Security for Your Legacy OPC Server

Bolster Security for Your Legacy OPC Server

This guest blog post was written by Lee Neitzel, senior engineer at Emerson Process Management. post. If you currently have an OPC server, you can quickly and easily overcome its security shortcomings and difficulties by wrapping it with OPC .NET, which combines...
How Do You Balance Connectivity with Security on the Plant Floor?

How Do You Balance Connectivity with Security on the Plant Floor?

This guest post is authored by Jim Flagg, systems architect for Polytron.   Manufacturing facilities increasingly are becoming reliant on network connectivity to improve operational efficiency.  Getting an internet connection on the plant floor without running it...
How to Protect Water and Wastewater Facilities from Cyberattack

How to Protect Water and Wastewater Facilities from Cyberattack

This guest post is authored by David Mattes, founder of Asguard Networks of Seattle, Wash.  “If you aren’t scared yet, you haven’t been paying attention.”  So goes the aphorism for modern times, and it applies equally well to industrial cybersecurity.  Conclusive...
13 Ways Through A Firewall: What You Don’t Know Can Hurt You

13 Ways Through A Firewall: What You Don’t Know Can Hurt You

This article was written by Andrew Ginter, director of industrial security at Waterfall Security Solutions. Firewalls are seen as pillars of both business-focused and industrial, control-system-focused cybersecurity programs. But how secure are firewalls really?...
Six Steps to Control System Cybersecurity

Six Steps to Control System Cybersecurity

This post was written by Lee Neitzel, senior engineer at Emerson Process Management in Austin, Tex. If you are like most process automation professionals, you are aware that your automation systems are not as secure as they should be, and you would like to make...
Implementing Security for Industrial Automation Systems (Part 2)

Implementing Security for Industrial Automation Systems (Part 2)

This is Part 2 of a guest blog post series by Ronald L. Krutz, Ph.D., a scientist and consultant specializing in cybersecurity services, and author of the ISA book Industrial Automation and Control System Security Principles. Click this link to read a brief Q&A...
Implementing Security for Industrial Automation Systems (Part 1)

Implementing Security for Industrial Automation Systems (Part 1)

This is Part 1 of a guest post series authored by Ronald L. Krutz, Ph.D., a scientist and consultant specializing in cybersecurity services, and author of the ISA book Industrial Automation and Control System Security Principles. Click this link to read a brief...
ISA Develops Cybersecurity Resource Guide

ISA Develops Cybersecurity Resource Guide

To download the free resource guide, click the link at the bottom of this blog post. Industrial control systems are often responsible for the monitoring and management of critical assets such as power generating facilities, water and wastewater treatment plants and...

ISA and Automation Federation Drive Engineering Agenda Forward

In mid-April, a core team of executives and volunteer leaders from ISA and Automation Federation (AF) took a seat at the table with several  engineering societies to discuss the future of the engineering profession.  More than 30 engineering groups participated in...

Ramping Up for the 55th Annual Power Industry Symposium (POWID)

  55th Annual ISA Power Industry (POWID) Symposium 3–8 June 2012 Austin, Texas Each year, the ISA POWID Symposium brings together the best and brightest engineering minds in power generation and energy markets.  Hundreds attend this annual event to dive deep into...
Uninterruptible Power Supply Technology and Cybersecurity

Uninterruptible Power Supply Technology and Cybersecurity

This post was written by Michael A. Stout, vice president of engineering at Irwindale, Calif.-based Falcon Electric, Inc. The recent number of cyber-attacks and their level of sophistication have demonstrated the inadequate network security measures employed by many...
Process Control Network Security Connectivity Simplified

Process Control Network Security Connectivity Simplified

This article was written by Scott Howard and Lisa Lorenzin.   The susceptibility of control systems to security issues continues to confront organizations. While it may be rare to penetrate a control system directly from the Internet, corporate connections, remote...
How Stuxnet Spreads

How Stuxnet Spreads

This article is an excerpt from the white paper, “How Stuxnet Spreads” by Eric Byers, Andrew Gintner and John Langill. For information about the full article, see the link at the bottom of this post.[/dropshadowbox] The Stuxnet worm is a sophisticated...

Pin It on Pinterest