Need continuing education credits? Join Us For Five Days of Education on the Industry's Leading Topics beginning October 5th!Save Your Seat

Cybersecurity

Courtesy: CFE Media and Technology
Cybersecurity September 30, 2020

Physical security: picking up the pieces

Businesses need to be ready to pick up where they left off when it comes to enhancing physical security measures in the wake of COVID-19.

By Gregory Hale
This message will self-destruct in seven days, or it can be erased with a flash of blue light. Written with UV light, the letters are marked out by molecules that shrink by storing energy, stretching the atoms of the semiconductor above. This shifts the light emitted by the semiconductor to longer wavelengths, represented in the visible spectrum by yellow on a blue background. Courtesy: Che-Hsuan Cheng, Excitonics and Photonics Lab, University of Michigan
Cybersecurity September 29, 2020

Self-erasing chips stop counterfeit electronics

Self-erasing chips developed relies on a material that temporarily stores energy, changing the color of the light it emits and it self-erases in a matter of days or erased on demand.

By Kate McAlpine
Courtesy: H-ON Consulting, Control Engineering Europe
Cybersecurity September 21, 2020

System integrators need to comply with international cybersecurity requirements

System integrators need to ensure that their automation systems are IEC 62443-compliant to adhere to international cybersecurity requirements.

By Massimiliano Latini
Courtesy: CFE Media and Technology
Cybersecurity September 19, 2020

Securing the IoT by design

There are several preventive measures that can be taken to secure industrial processes against cyber attacks.

By Joe Lomako
Ron Brash, 31, Director of Cyber Security Insights, Verve Industrial Protection, Florissant, Mo., AS Information Technology & Applied Systems, Vancouver Island University, BS Technology, Security & Network Administration, British Columbia Institute of Technology, MS Computer Science, Concordia University
Events and Awards September 17, 2020

2020 Engineering Leader Under 40: Ron Brash, 31

Director of Cyber Security Insights, Verve Industrial Protection, Florissant, Mo., AS Information Technology & Applied Systems, Vancouver Island University, BS Technology, Security & Network Administration, British Columbia Institute of Technology, MS Computer Science, Concordia University

By Amanda Pelliccione
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 16, 2020

Four tips on cybersecurity risk assessments

It’s hard to know how much cybersecurity spending is enough to lower risk to an acceptable level. What is enough and what else is needed? A cybersecurity risk assessment (CRA) can help. Four tips are highlighted.

By Erez Ravina and Atanu Niyogi
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 10, 2020

Manage data flow to boost cyber-physical system performance

A suite of algorithms has been developed to improve the performance of cyber-physical systems by balancing each component’s need for data with how fast that data can be sent and received.

By Matt Shipman
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 9, 2020

Remote teams struggling to mitigate cybersecurity risks

More workers are forced to work remotely due to COVID-19, but cybersecurity prevention and training is lagging behind.

By NordVPN Teams
Courtesy: Emerson
Cybersecurity September 7, 2020

Assessing cybersecurity today to improve tomorrow’s manufacturing operations

Simple strategies to achieve the most value from cyber risk assessments. Three strategies for operations technology (OT) teams to avoid while performing assessments are highlighted.

By Alexandre Peixoto and Rick Gorskie
Bar graph of cybersecurity products and services used: Respondents could check all the products and services that apply. The most universally used is anti-virus software by 91% of respondents. More than half use regular patch updates and firewall logs; 46% use network logs; 39% get help from the IT department. Six other product or services fall into the 36% to 31% range: Cybersecurity analytics/monitoring-internal, Patch updates-emergency, Instruction detection or prevention systems, Physical guards and port protection, Industrial control system cybersecurity tools, and Password audits. Courtesy: Control Engineering 2020 Cybersecurity Research Report
Cybersecurity September 5, 2020

Cybersecurity tips from subscribers

Cybersecurity advice about process, technologies, people (internal) and external threat resulted from the Control Engineering 2020 Cybersecurity Research Report. See graphic of technologies and services used online.

By Mark T. Hoske