Cybersecurity

Cybersecurity September 11, 2007

CIO alert: Most believe a mobile breach is inevitable; it’s time to actively monitor data stored on corporate mobile devices

If a device falls into the wrong hands, the impact on a company's competitive positioning, brand and reputation could be severe.

By Manufacturing Business Technology Staff
Cybersecurity August 1, 2007

Network security is more than encryption

Much data transmitted over networks is sent in clear text, making it easy for unwanted persons to capture and read sensitive information. Encryption plays a vital role in securing these data by translating them into a secret code. It protects data from intruders and ensures that only the intended recipient can decode and read the information by accessing a secret key or password that enables de...

By Daryl Miller
Cybersecurity May 3, 2007

On call 24/7: Wireless system detects open circuits

Cooper Bussman InVision system detects when a circuit protection device has opened, alerts maintenance personnel which device has operated (phone, text, email), where it is located, part number of the replacement device, and the appropriate level of personal protective equipment to wear to replace or reset the device.

By Control Engineering Staff
Cybersecurity January 22, 2007

A Closer Look at Windows Vista, Part I: Security Changes by National Insturments

Malware refers to any software that secretly infiltrates and damages a computer system without the informed consent of the owner. Despite the use of anti-virus and anti-spyware software, malware can still affect even careful users. One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware.

By Control Engineering Staff
Cybersecurity October 1, 2006

IBM advances security services position, buys ISS

IBM will acquire Atlanta-based Internet Security Systems Inc. (ISS) in an all-cash transaction for about $1.3 billion, or $28 a share. The move is subject to shareholder and regulatory approvals and customary closing conditions. The deal is expected to close in the fourth quarter. The acquisition is IBM's fourth in recent weeks, and at $1.

By Staff
Cybersecurity August 17, 2006

Generic tag security offered for RFID

Westminster , CO — SkyeTek Inc. unveiled what it calls the industry’s most advanced security technology for protecting the integrity and privacy of broad radio frequency identification (RFID) implementations in HF and UHF. The best cryptography implemented today is found in government, financial, and Internet applications in the form of Advanced Encryption Standard (AES) and the Secure Hash Algorithm (SHA), specified as industry standards.

By Control Engineering Staff
Cybersecurity August 10, 2006

Best practices for control systems security

The US Department of Homeland Security, Control Systems Security Program (CSSP) announces a Web site resource for control systems security personnel. The site provides Control System Security Program activities, as well as information on cyber threats, vulnerabilities and mitigations. Recommended practices for securing control systems, which have been vetted through industry and government experts, are available through the US CERT Control Systems web site ( www.us-cert.gov/control_systems ). Site topics include a control systems vulnerabilities overview, a discussion of cyber threats to control systems, related training courses and relevant standards and references.

By Control Engineering Staff
Cybersecurity May 4, 2006

Reduce arc flash risk with infrared thermography, breakers: Webcast

A May 25 arc-flash safety Webcast from a sister publication to Control Engineering offers explanations about technologies and training to avoid this industrial hazard.

By Control Engineering Staff
Cybersecurity January 1, 2006

Twist-less, tape-less wire connections

An AWG #10 push-wire connector is the latest addition to the Wall-Nuts product line from Wago. Series 773-173 Wall-Nuts connector is designed as an alternative to traditional twist-wire connectors. No twisting and taping are required. The technician strips the wire and inserts the conductor. A transparent housing allows visual confirmation of the connection.

By Staff
Cybersecurity November 1, 2005

Chemical industry merges cybersecurity efforts

Two chemical-industry cybersecurity groups agreed to merge their efforts into one organization- The move to consolidate initiatives, expected to be complete by Jan. 1, 2006, follows two years of cooperation between the Chemical Sector Cybersecurity Program (CSCP) and the Chemical Industry Data Exchange (CIDX).

By Staff