See tips and tricks on automation and control system project management for advice from the 2012 System Integrator of the Year Award Winners. See related videos.
The first step in creating an effective defense is figuring out where the vulnerabilities are in the system. This is a difficult but necessary process, and it never ends. » more
Control in the field vs. control in the host: Foundation fieldbus technology allows for both, so how do you choose? A new study offers suggestions.
As industrial networks move into the conventional IT space, security engineers think we’re missing some obvious safeguards.