Networking & Security - Cyber Security

Vote now for 2019 Engineers' Choice Finalists

Vote now for 2019 Engineers' Choice Finalists

The official ballot is open for voting for Control Engineering North American print and digital... » more

Standard specifying capabilities for components released

Standard specifying capabilities for components released

ISA/IEC 62443-4-2-2018, published by the International Society of Automation (ISA), sets forth... » more

Pharmaceutical manufacturers need to consider cybersecurity for PLCs

Pharmaceutical manufacturers need to consider cybersecurity for PLCs

Pharmaceutical manufacturers need to enact cybersecurity measures for their programmable logic... » more

Optimize machine metrics with a machine-as-a-service model, blockchain

Optimize machine metrics with a machine-as-a-service model, blockchain

Machine as a service (MaaS) and blockchain manage and secure machine data and transactions.... » more

Industrial cloud platforms need to demonstrate value

Industrial cloud platforms need to demonstrate value

Control Engineering China: While GE seeks to sell its digital assets, cloud platform developers... » more

Six IoT implementation challenges and solutions

Six IoT implementation challenges and solutions

The Internet of Things (IoT) is gaining acceptance, but some companies remain hesitant to implement... » more

Easier machine connectivity, communications add value

Easier machine connectivity, communications add value

Think again: Machine tool original equipment manufacturers, automation suppliers to OEMs, system... » more

How to use multi-factor authentication to protect a network

How to use multi-factor authentication to protect a network

Multi-factor authentication (MFA) is a technique that, when implemented properly, can be an... » more

How to design secure remote-controlled operations

How to design secure remote-controlled operations

Six tips can help with cybersecurity and remote-controlled or remote-monitoring applications for... » more

Cybersecurity standard specifies capabilities for control system components

Cybersecurity standard specifies capabilities for control system components

The ISA/IEC 62443-4-2-2018 standard provides the cybersecurity technical requirements for... » more

Method to protect power grid from cyber attacks developed

Method to protect power grid from cyber attacks developed

Researchers at UC Santa Barbara have developed a method that could protect the power grid from... » more

A new-age approach to traditional manufacturing issues

A new-age approach to traditional manufacturing issues

The Global Automation and Manufacturing Summit (GAMS) event at IMTS 2018 highlighted the... » more

Cybersecurity experts to oversee data security produced by Large Hadron Collider

Cybersecurity experts to oversee data security produced by Large Hadron Collider

Researchers from Indiana University‚Äôs Center for Applied Cybersecurity Research (CACR) will oversee... » more

Vote now for 2019 Engineers' Choice Finalists Standard specifying capabilities for components released Pharmaceutical manufacturers need to consider cybersecurity for PLCs Optimize machine metrics with a machine-as-a-service model, blockchain Industrial cloud platforms need to demonstrate value Six IoT implementation challenges and solutions Easier machine connectivity, communications add value How to use multi-factor authentication to protect a network How to design secure remote-controlled operations Cybersecurity standard specifies capabilities for control system components Method to protect power grid from cyber attacks developed A new-age approach to traditional manufacturing issues Cybersecurity experts to oversee data security produced by Large Hadron Collider

Avoid the worst control system ever

Automation System Integration Blog: Nobody wants to get a screaming... » more

All Blog Entries
click me