Cybersecurity

By 2021, an estimated 3.5 million cybersecurity jobs across the globe will be unfilled according to Cybersecurity Ventures. The WVU Lane Department of Computer Science and Electrical Engineering hopes to help plug the demand with a project called ‘ACCESS’ that cultivates cybersecurity experts through scholarships. Courtesy: West Virginia University
Cybersecurity August 13, 2019

University receives award to prepare students for cybersecurity jobs

West Virginia University has received a $1 million award from the National Science Foundation (NSF) to prepare students for cybersecurity jobs with a project called "ACCESS," which cultivates cybersecurity experts through scholarships and education.

By Jake Stump
Figure 1: Industrial controllers such as this traditional PLC/PAC, are typically installed in control panels local to the equipment or processes they monitor and automate. Courtesy: Opto 22
Cybersecurity August 12, 2019

Top 5 Control Engineering articles August 5-11

Articles about controller options for industrial applications, machine safety, alarm management, robotic actuators, and industrial cybersecurity needs were Control Engineering’s five most clicked articles from August 5-11. Miss something? You can catch up here.

By Chris Vavra
Courtesy: Chris Vavra, CFE Media
Cybersecurity August 7, 2019

Industrial cybersecurity strategies need a new approach

While Industrie 4.0 and the Industrial Internet of Things (IIoT) is enhancing the digital and connectivity capabilities of industrial control systems (ICSs) it has also opened the floodgates to serious cybersecurity risks.

By Suzanne Gill
Emerging technologies are solving the problem of unconnectable assets, providing data from legacy systems to people on the shop floor. Courtesy: Fluke
Cybersecurity August 2, 2019

Modern technologies solve industrial cybersecurity needs

Emerging condition monitoring software and devices have ingrained cybersecurity that helps bring legacy systems and processes into the modern era.

By Edward Valencia
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 26, 2019

Anomaly detection can prevent cyber attacks

Understanding what devices a manufacturer has working on a network is important, but the next step is to take that knowledge and move toward prevention.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 25, 2019

Cybersecurity alliance’s founding members announced

The International Society of Automation (ISA) named the founding members of its Global Cybersecurity Alliance (GCA): Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks.

By International Society of Automation (ISA)
Figure 2: Ladder logic programming example; LL is the most commonly used PLC programing, most closely resembling circuit diagrams used for relays. Courtesy: Frank Lamb, Automation Primer
Cybersecurity July 22, 2019

Top 5 Control Engineering articles July 15-21

Articles about PLC programming languages, digitalization advantages, alarm management tips, operationalizing cybersecurity, and CNC developments were Control Engineering’s five most clicked articles from July 15-21. Miss something? You can catch up here.

By Chris Vavra
Karthik Pattabiraman, an associate professor of electrical and computer engineering at the University of British Columbia, is trying to make smart meters hackproof. Courtesy: University of British Columbia/ISSSource
Cybersecurity July 19, 2019

Researchers trying to make smart meters hackproof

Researchers at the University of British Columbia are developing an automated program in development aimed at improving the security of these devices and boosting security in the smart grid.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 15, 2019

Benefits of operationalizing cybersecurity

Operationalizing cybersecurity requires balancing protection and response with cyber attacks, which are not predictable, and trying to stay ahead of the people who are actively looking to cause problems.

By Gregory Hale
Users need to consider value, design flexibility, and potential modifications when choosing an enclosure for a manufacturing application. Courtesy: Rittal
Cybersecurity July 15, 2019

Top 5 Control Engineering articles July 8-14

Articles about selecting an enclosure, using context with the IIoT, cybersecurity best practices, digitalization advantages, and connecting a PLC were Control Engineering’s five most clicked articles from July 8-14. Miss something? You can catch up here.

By Chris Vavra