With the gas shortages stemming from the ransomware attack on the Colonial Pipeline Co. still fresh in our minds, coupled with the fact that most cybersecurity efforts tend to focus on IT assets like ...
At the end of February, PICMG (PCI Industrial Computer Manufacturers Group)—the consortium for open hardware specifications—introduced InterEdge, a modular architecture for process control systems ...
Company is first industrial control systems provider to receive ISASecure ISA/IEC 62443 cybersecurity certifications across distributed control system, components, secure development lifecycle, and ...
Time and again, industry reports provide discouraging evidence that our defenders are unable to detect and prevent intrusions from advanced, directed and highly structured cyber threats in a timely ...
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? A recent incident where a likely nation-state threat ...
The ISA/IEC 62443 series of standards define requirements and processes for implementing and maintaining electronically secure industrial automation and control systems (IACS). These standards set ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. Industrial control systems are often some ...
The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report. The systems that power the manufacturing, power and water plants, the ...
Conventional wisdom is that there’s not much to selecting an industrial enclosure. Yet the last likely item chosen for an industrial control system turns out to have an outsized impact as a simple ...
The Stuxnet and Target attacks have squashed many of the myths about securing industrial control system security. Myth #1 – Isolating control systems networks keeps them safe from malicious attacks: ...
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems. Engineering workstation compromises were ...