Courtesy: Chris Vavra, CFE Media
Cybersecurity June 18, 2019

Providing security data in context for operators

Operators need to know the quality of that data within the proper context as the volume of data continues to increase to better prepare them for potential cyber attacks and other malicious events.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 9, 2019

Financially motivated cyber attacks against manufacturers rising

The 2019 Verizon Data Breach Investigations Report (DBIR) found the motive for cyber attacks against manufacturers are largely financial in nature, though espionage also remains a strong motivator for some.

By Gregory Hale
If a mobile device is lost, it’s vital the industrial apps are wiped, and that plant access is terminated immediately. Courtesy: Inductive Automation
Cybersecurity June 5, 2019

Adapting to the new mobile device landscape

Using mobile devices on the plant floor offers many potential benefits, but the right approach is a must because of safety and cybersecurity concerns.

By Travis Cox
To take advantage of the cloud’s flexible computing power without exposing proprietary or location information, the Argonne team essentially warps, or “perturbs,” the model and data being sent for calculations, changing key variables and equations. A disguised version of the problem goes to a cloud-based “solver” computer, and the answer is returned to a local, secure server for decoding. Courtesy: Argonne National Laboratory/ISSSource
Cybersecurity June 2, 2019

Electrical grid data cloaked in the cloud

A framework is being developed at the Department of Energy’s (DOE) Argonne National Laboratory that cloaks sensitive data, which allows grid operators to securely perform complex calculations in the cloud.

By Gregory Hale
Courtesy: CFE Media
Cybersecurity June 1, 2019

Effective cybersecurity needs compliance and dedication

Cybersecurity regulations are deliberately written to be forward looking and encourage best behaviors and companies should be vigilant in their compliance to prevent potential cyber attacks.

By Anne Klebsch
Figure 1. Bypass and configured packages include a replaceable variable frequency drive. Courtesy: Yaskawa
Cybersecurity June 1, 2019

Control Engineering hot topics, May 2019

Control Engineering's most clicked articles in May 2019 included stories about VFDs, safe human-robot interaction, sustainable cybersecurity, object-oriented programming, the Career and Salary Survey, and more. Miss something? You can catch up here.

By Chris Vavra
As human-machine interfaces (HMIs) have modernized in the last decade, they can now control and monitor multiple machines at once, to provide a complete overview of a production facility. Courtesy: EU Automation
Cybersecurity May 30, 2019

It’s time the mobile HMI caught up

Mobile human-machine interfaces (HMIs) have evolved over the last decade and offer a lot of potential value on the plant floor, but there are perceived cybersecurity and risk management issues for many users that need to be overcome.

By Mark Howard
Figure 4: In an integrated SIS architecture, safety-critical functions logically and physically are separated—still complying with ISA and NAMUR standards—yet located on the same system. This eliminates the need to maintain multiple defense-in-depth designs. Courtesy: Emerson
Cybersecurity May 27, 2019

Top 5 Control Engineering articles May 20-26

Articles about sustainable cybersecurity architecture, robot ethics, data historian history, location intelligence and the IIoT, and online education benefits were Control Engineering’s five most clicked articles from May 20-26. Miss something? You can catch up here.

By Chris Vavra
Scientists at the Army Research Lab (ARL) and Towson University may have identified a way to improve the cybersecurity of distributed network intrusion detection. Courtesy: U.S. Army Illustration/ISSSource
Cybersecurity May 25, 2019

Method developed to detect cyber attacks with compressed network traffic

Researchers at the U.S. Army Research Laboratory (ARL) and Towson University are developing a method on compressing network traffic as much as possible without losing the ability to detect and investigate malicious activity.

By Gregory Hale
Courtesy: CFE Media
Cybersecurity May 18, 2019

Securing electric substations

Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.

By Gregory Hale