Cybersecurity

Courtesy: Daniel E. Capano
Cybersecurity July 11, 2019

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

By Daniel E. Capano
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 11, 2019

Teaching the next generation of cryptographic hardware experts

Aydin Aysu, a researcher at North Carolina State University, is offering a course to prepare students to make use of next-generation cybersecurity tools such as cryptography hardware.

By Matt Shipman
Courtesy: Chris Vavra, CFE Media
Cybersecurity July 8, 2019

Report finds cybersecurity basics still not being practiced by companies

A report from Applied Risk found that cybersecurity basics are still not being practiced by many companies, which is increasing their risk for potential attacks as untested technologies continue proliferating critical infrastructures.

By Applied Risk
Figure 5: Top factors for job satisfaction are feeling of accomplishment, technical challenge, and financial compensation. Courtesy: Control Engineering research, CFE Media and CFE Technology
Cybersecurity July 1, 2019

Control Engineering hot topics, June 2019

Control Engineering's most clicked articles in June 2019 included stories about the Career and Salary Survey, alarm management and process safety, choosing the right HMI, retrofitting Industrie 4.0, DCS migration, and more. Miss something? You can catch up here.

By Chris Vavra
Borzoo Bonakdarpour, assistant professor of computer science at Iowa State University, is working on ways to improve efficiency and maintain security when operating a fleet of drones. Courtesy: Iowa State University/ISSSource
Cybersecurity June 23, 2019

Researchers working on automating fleet of drones

A team of researchers at Iowa State University are looking to deploy fleets of drones, but it's trickier than it sounds due to unexpected weather events and cybersecurity concerns.

By Gregory Hale
“Fiat Cryptography,” a system developed by MIT researchers, automatically generates — and simultaneously verifies — cryptographic algorithms optimized across all hardware platforms. Courtesy: Chelsea Turner, MIT
Cybersecurity June 22, 2019

Automated cryptocode generator developed to secure web browsers

An MIT-developed cryptographic system, Fiat Cryptography, is helping better protect a user's data and better secure websites by automatically generating optimized cryptography code that’s usually written by hand.

By Rob Matheson
Researchers at the University of Bath are looking to see if a simple device can encourage people to make a behavioral change to protect their data and privacy. Courtesy: University of Bath/ISSSource
Cybersecurity June 20, 2019

Researchers developing tools to encourage users to change passwords

Researchers from the University of Bath and Goldsmiths investigate whether a device that plugs in to a PC and signals to a user to change their password could help improve cybersecurity.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 18, 2019

Providing security data in context for operators

Operators need to know the quality of that data within the proper context as the volume of data continues to increase to better prepare them for potential cyber attacks and other malicious events.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Cybersecurity June 9, 2019

Financially motivated cyber attacks against manufacturers rising

The 2019 Verizon Data Breach Investigations Report (DBIR) found the motive for cyber attacks against manufacturers are largely financial in nature, though espionage also remains a strong motivator for some.

By Gregory Hale
If a mobile device is lost, it’s vital the industrial apps are wiped, and that plant access is terminated immediately. Courtesy: Inductive Automation
Cybersecurity June 5, 2019

Adapting to the new mobile device landscape

Using mobile devices on the plant floor offers many potential benefits, but the right approach is a must because of safety and cybersecurity concerns.

By Travis Cox