Cybersecurity October 25, 2018

Standard specifying capabilities for components released

ISA/IEC 62443-4-2-2018, published by the International Society of Automation (ISA), sets forth security capabilities that enable a component to mitigate threats for a given security level without the assistance of compensating countermeasures.

By International Society of Automation (ISA)
Cybersecurity October 18, 2018

Pharmaceutical manufacturers need to consider cybersecurity for PLCs

Pharmaceutical manufacturers need to enact cybersecurity measures for their programmable logic controller (PLCs) to prevent hackers from causing damage that could have major repercussions for the health of the company's customers.

By Steven Pflantz, PE, CRB
Cybersecurity October 17, 2018

Optimize machine metrics with a machine-as-a-service model, blockchain

Machine as a service (MaaS) and blockchain manage and secure machine data and transactions. Blockchain, while known for its use in the financial world, is being used by Steamchain, a start-up company, to provide secure financial and machine information design to help end users and original equipment manufacturers (OEMs).

By Mark T. Hoske, Chris Vavra, CFE Media
Courtesy: Control Engineering China
Cybersecurity October 16, 2018

Industrial cloud platforms need to demonstrate value

Control Engineering China: While GE seeks to sell its digital assets, cloud platform developers need to more consistently explain customer value, offer better applications, and be patient.

By Stone Shi
Figure 1. There are two ways to ensure secure data transmission to the asset performance management (APM): connecting the APM to the supervisory control and data acquisition’s (SCADA’s) historian, or using independent infrastructure. Image courtesy: Motors@Work
Cybersecurity October 15, 2018

Six IoT implementation challenges and solutions

The Internet of Things (IoT) is gaining acceptance, but some companies remain hesitant to implement it. Six common concerns are highlighted, along with ways teams can address any concerns from management.

By Nicole Dyess
Cybersecurity October 13, 2018

Easier machine connectivity, communications add value

Think again: Machine tool original equipment manufacturers, automation suppliers to OEMs, system integrators, and end users at IMTS 2018 find value in easier machine connectivity, communications, and visualization. Are you watching others or participating?

By Mark T. Hoske, content manager, CFE Media
Cybersecurity October 12, 2018

How to use multi-factor authentication to protect a network

Multi-factor authentication (MFA) is a technique that, when implemented properly, can be an efficient deterrent from cyberattacks, but heed these additional precautions to prevent information from being compromised.

By Dan Capano
Cybersecurity October 11, 2018

Vote now for 2019 Engineers’ Choice Finalists

The official ballot is open for voting for Control Engineering North American print and digital edition subscribers, for a limited time. Review finalists and vote by using CFE Media's New Products for Engineers platform. (Voting closed Jan. 4, 2019.)

By Amanda Pelliccione
Cybersecurity October 10, 2018

How to design secure remote-controlled operations

Six tips can help with cybersecurity and remote-controlled or remote-monitoring applications for industrial control systems (ICSs).

By Tom Gilbert, Blue Ridge Networks
Cybersecurity September 26, 2018

Cybersecurity standard specifies capabilities for control system components

The ISA/IEC 62443-4-2-2018 standard provides the cybersecurity technical requirements for components that make up an IACS, specifically the embedded devices, network components, host components and software applications.

By International Society of Automation (ISA)