Operators need to know the quality of that data within the proper context as the volume of data continues to increase to better prepare them for potential cyber attacks and other malicious events.
The 2019 Verizon Data Breach Investigations Report (DBIR) found the motive for cyber attacks against manufacturers are largely financial in nature, though espionage also remains a strong motivator for some.
Using mobile devices on the plant floor offers many potential benefits, but the right approach is a must because of safety and cybersecurity concerns.
A framework is being developed at the Department of Energy’s (DOE) Argonne National Laboratory that cloaks sensitive data, which allows grid operators to securely perform complex calculations in the cloud.
Cybersecurity regulations are deliberately written to be forward looking and encourage best behaviors and companies should be vigilant in their compliance to prevent potential cyber attacks.
Control Engineering's most clicked articles in May 2019 included stories about VFDs, safe human-robot interaction, sustainable cybersecurity, object-oriented programming, the Career and Salary Survey, and more. Miss something? You can catch up here.
Mobile human-machine interfaces (HMIs) have evolved over the last decade and offer a lot of potential value on the plant floor, but there are perceived cybersecurity and risk management issues for many users that need to be overcome.
Articles about sustainable cybersecurity architecture, robot ethics, data historian history, location intelligence and the IIoT, and online education benefits were Control Engineering’s five most clicked articles from May 20-26. Miss something? You can catch up here.
Researchers at the U.S. Army Research Laboratory (ARL) and Towson University are developing a method on compressing network traffic as much as possible without losing the ability to detect and investigate malicious activity.
Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.