Cybersecurity

There are many security challenges in industrial environments, but two of the most notable are a lack of visibility and insecure design, which can cause many problems for companies. Courtesy: Chris Vavra, CFE Media and Technology
Cybersecurity November 22, 2019

Extend IT security to the plant floor

Cybersecurity is critical as information technology (IT) and operations technology (OT) converge, which is the first step in making the transition between the two sides almost seamless.

By Chris Vavra
Courtesy: Chris Vavra, CFE Media
Cybersecurity November 14, 2019

IT/OT collaboration must drive digitalization

Converging information technology (IT) and operations technology (OT) does little to move end-to-end digitalization forward. What makes digitalization really work is successful OT and IT collaboration and an understanding of what the other side needs. See 7 tips for smarter OT and IT collaboration.

By Michael Bingaman
For controls technology innovators, IT/OT convergence was happening for decades before the IIoT and Industry 4.0 conversations that often draw attention to the concept today. Courtesy: Beckhoff Automation
Cybersecurity November 12, 2019

IT/OT convergence provides a path forward

Long before Industry 4.0 and cloud-connected architectures became possible, innovators championed PC-based technologies for industrial automation.

By Daymon Thompson
These AutomationDirect StrideLinx VPN routers provide built-in firewall protection to isolate machine level LAN and companywide WAN networks, and optional 4G connectivity, enabling cloud-based remote access and simplifying implementation. Courtesy: AutomationDirect
Cybersecurity November 7, 2019

Secure remote connections with cloud technologies

Cloud technologies enable remote connectivity for industrial applications, but can introduce security issues unless built from the ground up with cybersecurity in mind. See top five cybersecurity issues to address.

By Jonathan Griffith
Diagram shown cybersecurity attack stages through humans. Courtesy: Dan Capano
Cybersecurity November 6, 2019

The human asset in cybersecurity

Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.

By Daniel E. Capano
Courtesy: Chris Vavra, CFE Media
Cybersecurity November 5, 2019

Companies benefit from sharing cybersecurity efforts

A study from North Carolina State University finds that companies that disclosed cybersecurity risk management efforts before and after a competitor’s breach fared the best.

By Matt Shipman
Industry 4.0 success can be broken down into six steps, with each one become more involved from a data and intelligence standpoint. Not every company, however, starts at the beginning. It depends on what they’re already doing or not doing. Courtesy: Chris Vavra, CFE Media & Technology
Cybersecurity October 23, 2019

Finding success on the road to Industry 4.0

Six pillars of Industry 4.0: There’s so much talk about Industry 4.0, but many companies haven’t stopped to ask what success looks like and how to achieve it. Start with asking three questions, why the company needs Industry 4.0 and how to achieve success.

By Chris Vavra
Arrielle Opotowsky, a PhD student in nuclear engineering and engineering physics at UW-Madison, is researching machine learning methods that could allow us to quickly determine where a nuclear material came from based on measurements of that material. Courtesy: Sarah Page, University of Wisconsin-Madison
Cybersecurity October 18, 2019

Strengthening nuclear security with computational tools

Researchers at the University of Wisconsin-Madison are using machine learning methods that could allow scientists to strengthen nuclear security by giving scientists on the ground vital information quickly.

By Adam Malecek
Researchers at University of Michigan and University of Louisiana at Lafayette demonstrated that temperature control systems can be remotely manipulated using electromagnetic waves. Courtesy: University of Michigan
Cybersecurity October 17, 2019

Temperature sensors can be remotely targeted and hacked

Researchers at the University of Michigan and University of Louisiana at Lafayette demonstrated an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.

By Steve Crang
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 26, 2019

Manufacturers need to prepare for cyber threats

While industry sectors are starting to automate their processes to help increase productivity and efficiency and this requires greater connectivity, which also can expose systems to attack. 

By Suzanne Gill