Search
Close this search box.

Facilities

Four ways to sharpen the technology that runs buildings in 2020

Four ways to sharpen building system technologies

IoT and intelligent management systems have revolutionized the capabilities of our buildings by enabling better automation and increasing efficiencies for better overall building health

Courtesy: Verve Industrial

Compensating controls in ICS cybersecurity

Most operational technology (OT) environments use scan-based patching tools, which are pretty standard but not overly insightful to show us what assets we have and how they are configured. What is really needed is robust […]

The IDC IT/OT Convergence Survey shows the importance of achieving physical and cybersecurity integration.

Cybersecurity required for safe IIoT robots

For a robot to be safe, it must also be secure from cyberattacks in the age of Industrie 4.0 and the Industrial Internet of Things (IIoT). Everyone in the information technology (IT) and operations technology (OT) departments are responsible for ensuring this happens.

The human asset in cybersecurity

The human asset in cybersecurity

Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.

What OSHA can teach us about cybersecurity

What OSHA can teach us about cybersecurity

What does OSHA teach us about industrial cybersecurity? Clearly, high cybersecurity risk could increase risk of industrial accidents, but OSHA’s model can help in other ways. Prior to 1970, worker safety in industrial settings was […]

Eaton recommends managing cybersecurity risks through a Secure Development Lifecycle (SDL) with protocols in place for threat modeling, requirements analysis, implementation, verification and ongoing maintenance to manage risks throughout the product lifecycle.In October 2020, Eaton became the first company to have its product development processes certifiedby the IEC and UL. Eaton recently joined the International Society of Automation (ISA) Global CybersecurityAlliance as a founding member to advance advocacy for a global cybersecurity standard and industry collaboration. Courtesy: Eaton

How cybersecurity is affecting control and automation

Learning Objectives Cybersecurity global standards from IEC, ISA Global Cybersecurity Alliance and UL help lower risk.  Cybersecurity education and training.  The Industrial Internet of Things (IIoT), connected devices and the vast amounts of generated data create industrial […]

Four best practices for industrial wireless LANs

Four best practices for industrial wireless LANs

Deployments and optimal operation of industrial wireless local area networks (LANs) require attention to site survey, lifecycle management, cybersecurity and collaboration. Need to optimize existing industrial wireless networks?

Four ways to sharpen the technology that runs buildings in 2020

Four ways to sharpen building system technologies

IoT and intelligent management systems have revolutionized the capabilities of our buildings by enabling better automation and increasing efficiencies for better overall building health

Courtesy: Verve Industrial

Compensating controls in ICS cybersecurity

Most operational technology (OT) environments use scan-based patching tools, which are pretty standard but not overly insightful to show us what assets we have and how they are configured. What is really needed is robust […]

The IDC IT/OT Convergence Survey shows the importance of achieving physical and cybersecurity integration.

Cybersecurity required for safe IIoT robots

For a robot to be safe, it must also be secure from cyberattacks in the age of Industrie 4.0 and the Industrial Internet of Things (IIoT). Everyone in the information technology (IT) and operations technology (OT) departments are responsible for ensuring this happens.

The human asset in cybersecurity

The human asset in cybersecurity

Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.

What OSHA can teach us about cybersecurity

What OSHA can teach us about cybersecurity

What does OSHA teach us about industrial cybersecurity? Clearly, high cybersecurity risk could increase risk of industrial accidents, but OSHA’s model can help in other ways. Prior to 1970, worker safety in industrial settings was […]

Eaton recommends managing cybersecurity risks through a Secure Development Lifecycle (SDL) with protocols in place for threat modeling, requirements analysis, implementation, verification and ongoing maintenance to manage risks throughout the product lifecycle.In October 2020, Eaton became the first company to have its product development processes certifiedby the IEC and UL. Eaton recently joined the International Society of Automation (ISA) Global CybersecurityAlliance as a founding member to advance advocacy for a global cybersecurity standard and industry collaboration. Courtesy: Eaton

How cybersecurity is affecting control and automation

Learning Objectives Cybersecurity global standards from IEC, ISA Global Cybersecurity Alliance and UL help lower risk.  Cybersecurity education and training.  The Industrial Internet of Things (IIoT), connected devices and the vast amounts of generated data create industrial […]

Four best practices for industrial wireless LANs

Four best practices for industrial wireless LANs

Deployments and optimal operation of industrial wireless local area networks (LANs) require attention to site survey, lifecycle management, cybersecurity and collaboration. Need to optimize existing industrial wireless networks?

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES