Get the latest updates on the Coronavirus impact on engineers.Click Here

Cybersecurity

Courtesy: Stephen B. Morton/Georgia Institute of Technology
HMI, OI July 1, 2020

Control Engineering hot topics, June 2020

Control Engineering's most clicked articles in June 2020 included stories about workplace distancing, COVID-19 impacts, cybersecurity risk, HMI/SCADA software, and more. Miss something? You can catch up here.

By Keagan Gay
Courtesy: Inductive Automation
HMI, OI June 22, 2020

Top 5 Control Engineering articles June 15-21, 2020

Articles about manufacturing the COVID-19 pandemic, cybersecurity, HMI/SCADA software, digital transformation, and more were Control Engineering’s five most clicked articles from June 15-21, 2020. Miss something? You can catch up here.

By Keagan Gay
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 13, 2020

Phishing heads COVID-19 themed attacks

COVID-19 cyber attacks are on the rise according to researchers, and they are getting very sneaky in their methods.

By Gregory Hale
Courtesy: Control Engineering 2020 Cybersecurity Research Report
Cybersecurity June 13, 2020

Cybersecurity requires asset updates

Age of existing assets are the greatest cybersecurity risk factor, 67% in 2020 Control Engineering research, up from 46% in 2016. This is of particular concern with remote operations increasing due to the COVID-19 pandemic and manufacturing starting up again.

By Mark T. Hoske
Courtesy: Emerson
Cybersecurity June 9, 2020

Integrated control system can reduce cybersecurity risk

Integrated control and safety systems can simplify a strong cybersecurity posture for a manufacturer.

By Sergio Diaz
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 9, 2020

New ways to attack Industry 4.0

Researchers warn smart manufacturing users and security professionals to be aware of advanced hackers.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 7, 2020

DDoS attacks on rise due to COVID-19

The amount of distributed denial of service attacks (DDoS) rose at the beginning of this year primarily on education and municipal sites.

By Gregory Hale
Courtesy: H-ON Consulting
Cybersecurity June 6, 2020

Validate security effectiveness and reduce exposure to potential risk

Without evidence of security performance, companies may be left with significant cybersecurity risk, according to a Mandiant research report.

By Gregory Hale
Figure 1: Device integration, scalability and standards are key factors to consider when deploying IIoT systems. Courtesy: OpenText
IIoT, Industrie 4.0 June 5, 2020

Manage IIoT deployments before they become a three-ring circus

Data quality begins with device validation

By Bob Slevin
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity June 3, 2020

Protecting worker safety, security after COVID-19 pandemic

Expectations for workers are changing due to the pandemic. Even after they return to work, it's going to be different, and companies need to adjust to this and ensure their workers are cyber-secure.

By Gregory Hale