Josh Bozeman

Articles

Mobility January 13, 2015

Cyber security essentials: Part III

The third and final installment of the Cyber Security Essentials series identifies best practices for protecting your internal and external networks, components of well-secured networks, and other dangers to be aware of.

By Josh Bozeman
Cybersecurity January 6, 2015

Cyber security essentials: Part II

The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.

By Josh Bozeman
Cybersecurity December 30, 2014

Cyber security essentials: Part I

The first installment of the Cyber Security Essentials series introduces the topic of cyber security and outlines the major concepts to be aware of. Don't think you're not at risk.

By Josh Bozeman
DCS, SCADA, Controllers April 8, 2014

Distributed control systems: Four things to consider when emulating a third-party application

The capabilities of a DCS appear so limitless that we’re sometimes asked to replicate an external third-party application in the existing control system. Keep these four considerations in mind.

By Josh Bozeman