Cybersecurity
Figure 1: Cyber threats are proliferating due to increased information technology/operations technology (IT/OT) integration, along with the advent of the Industrial Internet of Things (IIoT) and open process automation (OPA) initiatives. Courtesy: Yokogawa Electric Corp.
Cybersecurity February 8, 2019

Proactive management of plant cybersecurity

A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the influx of Industrial Internet of Things (IIoT) devices and increased IT/OT integration.

By Camilo Gomez
Courtesy: CFE Media
Cybersecurity February 2, 2019

Understanding the impact of mobile cyberattacks

Manufacturers' technology often wasn’t built to suppress today’s digital threats and with the advent of mobile technology in the workplace, it is easy for hackers to exploit this soft weaknesses.

By Rich Scott
Courtesy: CFE Media
Cybersecurity February 1, 2019

Best practices to help improve system security

With increased connectivity between different devices, it’s critical to implement additional cybersecurity measures.

By Ken Robinson
Courtesy: CFE Media
Cybersecurity January 26, 2019

Untrained staff is the biggest cyber risk, according to report

A report by ESI ThoughtLab, in conjunction with Willis Towers Watson, found untrained staff is the greatest cybersecurity risk to business and a vast majority of companies know this.

By Gregory Hale
Courtesy: CFE Media
Cybersecurity January 22, 2019

Combining IT, OT with a security operations center

Companies can help prevent cyberattacks by forming a security operations center (SOC) to get the information technology (IT) and operations technology (OT) on the same page with the same goals.

By Heather MacKenzie
Courtesy: CFE Media
Cybersecurity January 20, 2019

Next-gen IoT security project being developed

Researchers have received a $750,000 grant to develop and commercialize a next-generation cryptosystem capable of protecting IoT devices from cybersecurity attacks through advanced authentication procedures.

By Gregory Hale
Cybersecurity for IoT robotic systems requires a multistep approach including a robust application security program. Courtesy: Robotic Industries Association/TÜV Rheinland
Cybersecurity January 15, 2019

Cybersecurity required for safe IIoT robots

For a robot to be safe, it must also be secure from cyberattacks in the age of Industrie 4.0 and the Industrial Internet of Things (IIoT). Everyone in the information technology (IT) and operations technology (OT) departments are responsible for ensuring this happens.

By Tanya M. Anandan
The Axio 360 NIST-CSF risk management platform is designed to establish a baseline for cyber readiness, and provides companies a risk reduction roadmap for ongoing improvement. Courtesy: Axio Global
Cybersecurity January 5, 2019

Cyber risk management platform

The Axio 360 NIST-CSF risk management platform is designed to establish a baseline for cyber readiness, and provides companies a risk reduction roadmap for ongoing improvement.

By Axio Global
Courtesy: CFE Media
Cybersecurity December 18, 2018

ICS/IIoT taxonomy needed for cybersecurity

There is many opinions and beliefs on what an industrial control system (ICS) is and what the Industrial Internet of Things (IIoT) comprises, which makes a common understanding crucial.

By Dale Peterson
Cybersecurity December 11, 2018

Digital transformation is crucial for automation, mobility, industrial workforce education

Digital transformation is vital for companies, but a clear business path and plan is needed to make it viable.

By Gregory Hale