Cybersecurity

Courtesy: Brett Sayles
Cybersecurity March 2, 2022

Operational technology risk assessments and cybersecurity principles

Assessing and monitoring the security of operation technology (OT) systems can be aided by conducting an OT cybersecurity threat risk assessment (TRA). An eight-step procedure is outlined.

By Mark Gauvreau
Image courtesy: Brett Sayles
Cybersecurity February 23, 2022

Operational technology risk assessments and security reviews

Protecting key resources and critical infrastructure (CI) is essential to security, public health and safety, economic vitality and our overall way of life.

By Mark Gauvreau
Courtesy: Phoenix Contact USA
Cybersecurity February 19, 2022

Cybersecurity advice: Micro-segmentation in ICS environments

Examine micro-segmentation as part of a broader cybersecurity architecture, not a replacement for the current cybersecurity architecture. Industrial cybersecurity system micro-segmentation decreases the attack vector on industrial environments, according to a company with a Control Engineering Engineers’ Choice Award product.

By Mariam Coladonato and Dan Schaffer
Courtesy: Brett Sayles
Cybersecurity February 15, 2022

Structure of IEC 62443

IEC 62443 is the international reference standard for industrial cybersecurity of components and systems developed in conformity with ISA/IEC requirements.

By H-ON Consulting
Courtesy: L&T Electrical & Automation, a unit of Schneider Electric India Private Ltd.
Cybersecurity February 15, 2022

How a unified operational system helps cybersecurity

Cybersecurity can improve with a unified operational system that integrates multiple pieces of equipment, updates codes and standards, combined with multiple original equipment manufacturers (OEMs) and software packages, providing a unified dashboard for the operator, according to a company with a Control Engineering Engineers’ Choice Award product.

By Nelson Meenparambil
Courtesy: Brett Sayles
Cybersecurity February 11, 2022

Five principles for guiding OT cybersecurity governance

Five principles to establish the right operational technology (OT) cybersecurity governance model for an industrial organization can create a more secure environment.

By John Livingston
Courtesy: Control Engineering, CFE Media and Technology, www.controleng.com 
Cybersecurity February 4, 2022

Lack of qualified cybersecurity personnel for wastewater facilities

Many water, wastewater, and other critical infrastructure organizations lack OT personnel skilled in cybersecurity and this could be dangerous when facing ransomware attacks such as BlackMatter

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity January 27, 2022

Reducing risk and responding to industrial environment threats

Many industrial organizations want “visibility” or “detection” but aren’t clear on the ultimate objective or how to measure it.

By John Livingston
Courtesy: AutomationDirect
Cybersecurity January 27, 2022

Cybersecurity-centered systems and fundamentals

For modern industrial control systems (ICSs), cybersecurity involves technologies and user best practices. Four cybersecurity fundamentals are highlighted.

By Damon Purvis
Courtesy: Brett Sayles
Cybersecurity January 20, 2022

Five steps for OT endpoint security success

Organizations need endpoint security and protection to stop ransomware in its tracks, but also to demonstrate improvement and secure baselines to various stakeholders.

By John Livingston