Daniel E. Capano
Making the case for full automation
Opinion: It is in everyone's best interests to move to full automation, particularly for publicly-owned facilities. Experiences running large spinning equipment in a dangerous and unhealthy environment led to exploring ways to reduce, if not eliminate, human involvement in the process.
Throwback Attack: Lessons from the Aurora vulnerability
A government-sponsored test on whether a cyberattack could inflict real-world physical damage has had major repercussions to this day. See eight steps on how to mitigate a potential cyberattack against your industrial control systems (ICSs).
How to select, apply process sensors
When specifying process sensors, several common factors need to be considered such as the operating environment, mounting options and cable connections.
Industrial wireless selection and implementation
Industrial wireless networks require a lot of planning and preparation because there are many elements that can hamper or interfere with manufacturing operations.
The human asset in cybersecurity
Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.
Understand the cyber-attack lifecycle
A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.
The art and science of solids level measurement
Experience is required to properly design and apply solids handling systems. Accurately measuring the quantity of solids in a tank or silo is crucial to product management, custody control, and transfer.