The official ballot is open for voting for Control Engineering North American print and digital edition subscribers, for a limited time. Review finalists and vote by using CFE Media's New Products for Engineers platform.
ISA/IEC 62443-4-2-2018, published by the International Society of Automation (ISA), sets forth security capabilities that enable a component to mitigate threats for a given security level without the assistance of compensating countermeasures.
Pharmaceutical manufacturers need to enact cybersecurity measures for their programmable logic controller (PLCs) to prevent hackers from causing damage that could have major repercussions for the health of the company's customers.
Machine as a service (MaaS) and blockchain manage and secure machine data and transactions. Blockchain, while known for its use in the financial world, is being used by Steamchain, a start-up company, to provide secure financial and machine information design to help end users and original equipment manufacturers (OEMs).
Control Engineering China: While GE seeks to sell its digital assets, cloud platform developers need to more consistently explain customer value, offer better applications, and be patient.
The Internet of Things (IoT) is gaining acceptance, but some companies remain hesitant to implement it. Six common concerns are highlighted, along with ways teams can address any concerns from management.
Think again: Machine tool original equipment manufacturers, automation suppliers to OEMs, system integrators, and end users at IMTS 2018 find value in easier machine connectivity, communications, and visualization. Are you watching others or participating?
Multi-factor authentication (MFA) is a technique that, when implemented properly, can be an efficient deterrent from cyberattacks, but heed these additional precautions to prevent information from being compromised.
Six tips can help with cybersecurity and remote-controlled or remote-monitoring applications for industrial control systems (ICSs).
The ISA/IEC 62443-4-2-2018 standard provides the cybersecurity technical requirements for components that make up an IACS, specifically the embedded devices, network components, host components and software applications.