Get the latest updates on the Coronavirus impact on engineers.Click Here


Courtesy: H-ON Consulting
Cybersecurity June 6, 2020

Validate security effectiveness and reduce exposure to potential risk

Without evidence of security performance, companies may be left with significant cybersecurity risk, according to a Mandiant research report.

By Gregory Hale
Figure 1: Device integration, scalability and standards are key factors to consider when deploying IIoT systems. Courtesy: OpenText
IIoT, Industrie 4.0 June 5, 2020

Manage IIoT deployments before they become a three-ring circus

Data quality begins with device validation

By Bob Slevin
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity June 3, 2020

Protecting worker safety, security after COVID-19 pandemic

Expectations for workers are changing due to the pandemic. Even after they return to work, it's going to be different, and companies need to adjust to this and ensure their workers are cyber-secure.

By Gregory Hale
Courtesy of: National Institute of Standards and Technology
Cybersecurity May 29, 2020

Public input requested on use of GPS for cybersecurity risk management

The National Institute of Standards and Technology (NIST) plans guidance to strengthen cybersecurity of related tech, in response to White House order.

By National Institute of Standards and Technology
Protecting PLCs and PACs from cybersecurity threats need to begin before the threat even starts. Courtesy: Emerson
PLCs, PACs May 26, 2020

Protect PLCs and PACs from cybersecurity threats

Protecting programmable logic controllers (PLC) and programmable automation controllers (PAC) from security threats should begin even before an attack is detected.

By Steve Ward
Courtesy: Kepware
Cybersecurity April 30, 2020

IT-OT collaboration needs context and increased visibility

Information technology (IT) and operational technology (OT) are continuing the process of working together, but non-manufacturing types need more understanding and context of what is happening on the plant floor for this merger to work.

By Gregory Hale
Courtesy: Massachusetts Institute of Technology
Cybersecurity April 23, 2020

Industrial network security best practice advice

Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted as well as three pillars for securing industrial networks.

By Alvis Chen
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity April 15, 2020

Associations unite for COVID-19 recovery

ASIS International and the Security Industry Association have partnered to help in the coronavirus recovery and rebuilding efforts. The primary focus areas will begin with business operations and advocacy, and content development and coordination.

By Gregory Hale
Courtesy: Honeywell
Cybersecurity April 14, 2020

COVID-19 cyber attacks and scams are a global issue

Cyber criminals are taking advantage of COVID-19 forcing the majority of employees forced to work remotely. Europol published an updated threat assessment after monitoring the impact of coronavirus and cybercrime.

By Gregory Hale
Courtesy: Siemens
Cybersecurity April 13, 2020

Coronavirus phishing attacks rising

With many employees working remotely, there is a rise in COVID-19 themed email phishing scams. Follow these suggested tips to keep companies safe.

By Gregory Hale