Cybersecurity

Courtesy: Chris Vavra, CFE Media
Cybersecurity September 26, 2019

Manufacturers need to prepare for cyber threats

While industry sectors are starting to automate their processes to help increase productivity and efficiency and this requires greater connectivity, which also can expose systems to attack. 

By Suzanne Gill
Figure 4: AutomationDirect’s C-more HMI mobile app works securely when used in conjunction with the secure StrideLinx VPN router. It’s also available for Google Android. Courtesy: AutomationDirect
Cybersecurity September 20, 2019

Selecting HMI remote access options

Two leading methods exist for establishing mobile human-machine interface (HMI) connectivity; one providing more cybersecurity. See table comparison of remote access HMI connections.

By Jonathan Griffith
Image courtesy: Chris Vavra, CFE Media
Cybersecurity September 19, 2019

Robot cybersecurity threats: What to watch for

In order for a robot to be safe, it should be protected against cyberattacks and possible security breaches and there are several ways this can happen.

By Robotic Industries Association (RIA)
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 17, 2019

IIoT adoption program launched to help IT, OT end users

The IIC accelerator program is designed to stimulate Industrial Internet of Things (IIoT) adoption to help information technology (IT) and operations technology (OT) users solve real problems they face in their businesses.

By Industrial Internet Consortium (IIC)
Cybersecurity September 12, 2019

Using web browsers for HMI, SCADA applications

New capabilities in mobile-responsive design make human-machine interfaces (HMIs) and supervisory control and data acquisition (SCADA) applications more valuable on the plant floor.

By Travis Cox
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 10, 2019

How to manage IoT cybersecurity

The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.

By Gregory Hale
Figure 3: Here the block diagram from figure 2 has been rearranged into a more familiar configuration that is functionally identical to a traditional feedback controller (blue) equipped with a setpoint filter (green) and a feedforward path (red). Most commercial feedback controllers include setpoint filtering and feedforward as standard options, making this version of model-following control simpler than the original version, and much easier to implement. Source: Control Engineering
Cybersecurity September 9, 2019

Top 5 Control Engineering articles September 2-8

Articles about model-following control, industrial controller cybersecurity, machine learning, improving engineer retention, and IIoT platforms were Control Engineering’s five most clicked articles from September 2-8. Miss something? You can catch up here.

By Chris Vavra
Courtesy: Chris Vavra, CFE Media
Cybersecurity September 6, 2019

Ensuring IIoT security best practices

The Industrial Internet Consortium (IIC) has developed a white paper designed to bolster best practices related to the Industrial Internet of Things (IIoT) and data security.

By Gregory Hale
Cybersecurity August 29, 2019

Industrial controller cybersecurity best practices

Protecting industrial automation systems is easier when controllers offer built-in cybersecurity features.

By Benson Hougland
A portion of the four-phase process used by SkyWalker to vet backend systems that support mobile apps. Courtesy: Georgia Tech, Ohio State University
Cybersecurity August 29, 2019

Smartphone apps may connect to vulnerable cloud servers

Cybersecurity researchers at Georgia Tech and Ohio State have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don’t even know exists.

By John Toon