Cybersecurity
The Axio 360 NIST-CSF risk management platform is designed to establish a baseline for cyber readiness, and provides companies a risk reduction roadmap for ongoing improvement. Courtesy: Axio Global
Cybersecurity January 5, 2019

Cyber risk management platform

The Axio 360 NIST-CSF risk management platform is designed to establish a baseline for cyber readiness, and provides companies a risk reduction roadmap for ongoing improvement.

By Axio Global
Courtesy: CFE Media
Cybersecurity December 18, 2018

ICS/IIoT taxonomy needed for cybersecurity

There is many opinions and beliefs on what an industrial control system (ICS) is and what the Industrial Internet of Things (IIoT) comprises, which makes a common understanding crucial.

By Dale Peterson
Cybersecurity December 11, 2018

Digital transformation is crucial for automation, mobility, industrial workforce education

Digital transformation is vital for companies, but a clear business path and plan is needed to make it viable.

By Gregory Hale
Cybersecurity December 11, 2018

Digital transformation is crucial for automation, mobility, industrial workforce education

Digital transformation is vital for companies, but a clear business path and plan is needed to make it viable.

By Gregory Hale
Cybersecurity December 9, 2018

Playing catch-up with cybersecurity

Cybersecurity risks need help from contracts and insurance beyond technologies, policies, and people. Pretending cybersecurity risks aren’t there isn’t on any list of best practices.

By Mark Voigtmann
Courtesy: CFE Media
Cybersecurity December 8, 2018

Digital transformation needs a solid cybersecurity plan

Companies looking towards a digital transformation need cybersecurity and they need everyone–not just IT–to take responsibility to make it work.

By Gregory Hale
Honeywell research finds exposure through portable USB drives can cause serious disruption to process facilities through unsecure or malicious files. Courtesy: Honeywell
Cybersecurity November 2, 2018

Study finds USB drives are a security threat to process control systems

Honeywell research finds exposure through portable USB drives can cause serious disruption to process facilities through unsecure or malicious files.

By Honeywell
Cybersecurity October 25, 2018

Standard specifying capabilities for components released

ISA/IEC 62443-4-2-2018, published by the International Society of Automation (ISA), sets forth security capabilities that enable a component to mitigate threats for a given security level without the assistance of compensating countermeasures.

By International Society of Automation (ISA)
Cybersecurity October 18, 2018

Pharmaceutical manufacturers need to consider cybersecurity for PLCs

Pharmaceutical manufacturers need to enact cybersecurity measures for their programmable logic controller (PLCs) to prevent hackers from causing damage that could have major repercussions for the health of the company's customers.

By Steven Pflantz, PE, CRB
Cybersecurity October 17, 2018

Optimize machine metrics with a machine-as-a-service model, blockchain

Machine as a service (MaaS) and blockchain manage and secure machine data and transactions. Blockchain, while known for its use in the financial world, is being used by Steamchain, a start-up company, to provide secure financial and machine information design to help end users and original equipment manufacturers (OEMs).

By Mark T. Hoske, Chris Vavra, CFE Media