Cybersecurity

Cybersecurity September 13, 2022

Securing the edge in a manufacturing facility

Manufacturers looking to gather more information at the edge need to have a strong cybersecurity program in place, but not enough do, leaving them at risk. See four ways to increase cybersecurity shields.

By Chris Vavra
5G mobile edge
Cybersecurity August 29, 2022

Top 5 Control Engineering content: August 22-28, 2022

The most-viewed content from the past week covered 5G, SCADA, programming, cybersecurity advice and more.

By Morgan Green
Cybersecurity August 17, 2022

Cybersecurity advice for industrial networks

Manufacturers and industrial automation companies are making cybersecurity a major priority. Knowing where to start and what to emphasize can be a challenge. Several tips are highlighted to improve industrial network cybersecurity.

By Jim Mansfield, Dan McKarns and David Schultz
Image courtesy: Brett Sayles
Cybersecurity August 16, 2022

Nine reasons why ICS/OT infrastructure is insecure

Industrial control system (ICS)/operational technology (OT) infrastructure security is different in many ways from informational technology (IT) security. Nine reasons why the infrastructure is insecure are highlighted.

By Ritesh Srivastava
Figure 2: A CDS provides advanced security for communications between information technology (IT) and operational technology (OT) security domains. Courtesy: ARC Advisory Group
Cybersecurity August 11, 2022

How cross-domain solutions can protect OT from IT-level attacks

Cross-domain solutions (CDS) can help secure communications between information technology (IT) and operational technology (OT) domains.

By Larry O’Brien
Cybersecurity August 10, 2022

Black-channel approach to functional safety

For easier commissioning and better performance, take a black-channel approach to functional safety, combined with the advantages of EtherCAT.

By Robert Trask, PE
Cybersecurity August 9, 2022

Assessing ransomware risk in IT and OT environments

Industrial organizations and governments are struggling to get their hands around the complicated cybersecurity issue of ransomware risk

By Dragos
Courtesy: Inductive Automation
Cybersecurity August 2, 2022

Four cybersecurity technologies, concepts can reduce industrial network risk

Explore the qualities and benefits of zero trust, principle of least privilege and other methods of improving cybersecurity. Four key technologies and security concepts are highlighted.

By Kevin McClusky
Image courtesy: Brett Sayles
Cybersecurity August 1, 2022

Four cybersecurity approaches and strategies for industrial networks

Companies implementing a cybersecurity program need to have a clear agenda and know the tools available. Four approaches and products are highlighted.

By Alan Raveling
Image courtesy: Brett Sayles
Cybersecurity July 27, 2022

What a shields-up approach means for industrial companies

As cyberattacks against manufacturers increase, companies are being advised to raise their shields and pivot toward a zero-trust cybersecurity strategy. Five zero trust elements are highlighted.

By Bill Moore