Topics of the Day

Safeguarding OT from Cyber Threats

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

Read More
Loading
 

Sponsored by

Securing Digital Transformation

An Internet-enabled industrial CCTV system went live online not too long ago and in three short minutes the camera started to get malicious traffic requests. Think about it: One system placed on the massive Internet and it started getting attacks in three minutes.

Mindset Changing on Safety and Profitability

Safety systems continue working silently in the background, chugging along keeping a constant vigil over manufacturing operations to ensure everyone goes home safely at the end of the day.

Safety, Connectivity and IIoT

Increased connectivity across any manufacturing enterprise, from the oil and gas industry all the way to making buttons for a clothing line, has the potential to hike business intelligence, productivity and profitability.

Security: People as a Strength

It wasn’t that long ago when a German steel mill fell victim to a cyber attack that resulted in parts of the plant failing and a blast furnace workers could not shut down through normal methods.

How to Start a Security Program

Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.


Safety and Profitability

Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.


Making Time for Security

Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.


Breaking News

 

VIEWS

Forget Hyperbole: Stay True to Security Message

By Gregory Hale One of the good things that occurred after last week’s news from the Department of Homeland Security (DHS) involving Russian attackers being able to penetrate the networks of hundreds of U.S. utilities is the...

FOCAL POINTS

INCIDENTS

Safety Fines for GA Mulch Maker

Specialty mulch maker, Garick LLC, operating as Smith Garden Products, is facing $148,867 in fines for exposing employees to safety hazards at its Cumming, Georgia, facility, said officials at the Occupational Safety and Health...

PRODUCTS AND SERVICES

Education Program on Key Locking System

A 1.0 Health, Safety and Welfare (HSW) continuing education program is ready to go for architect, engineering, government, and consulting firms focused on critical infrastructure products. The American Institute of Architects...

GOVERNMENT

Underground Gas Storage Safety Standards Amended

A final rule published adopting safety standards applicable to underground natural gas storage facilities, said officials at the Pipeline and Hazardous Materials Safety Administration (PHMSA). The new regulations, approved last...

TECHNOLOGY UPDATE

New Way to Simulate Nuclear Power Plants

Using the latest advances in numerical methods, physical modeling and software engineering it is now possible to simulate entire nuclear power plants. A new tool called the System Analysis Module (SAM) Reactor Analysis Code can...

TRAINING & CERTIFICATION

Education Program on Key Locking System

A 1.0 Health, Safety and Welfare (HSW) continuing education program is ready to go for architect, engineering, government, and consulting firms focused on critical infrastructure products. The American Institute of Architects...

CAREERS

Cybersecurity Boot Camp at ASU

The cybersecurity skills gap is a growing problem for businesses, with a nearly 500,000 person gap in cybersecurity talent in the U.S., according to (ICS)2, an international cybersecurity research organization. In an effort to...

STANDARDS

Underground Gas Storage Safety Standards Amended

A final rule published adopting safety standards applicable to underground natural gas storage facilities, said officials at the Pipeline and Hazardous Materials Safety Administration (PHMSA). The new regulations, approved last...

RESEARCH

DDoS Attacks Continue to Grow: Report

Distributed Denial of Service (DDoS) attacks grew in the fourth quarter of 2019 compared to the fourth quarter of 2018, but the difference between third and fourth quarter assaults last year was minimal, a new report found....

Industry Voices

  • By Tony Dozier

    By Tony Dozier While digital transformation is significantly impacting the security industry, it goes beyond just implementing new solutions. CIOs and IT professionals are having to re-examine their established security systems to drive continuous inno …

  • By Ray Watson

    By Ray Watson As manufacturing technology advances and companies find themselves tasked with managing increasingly sophisticated production systems, the industry is adopting methodologies that will help make operations faster and more efficient than ev …

  • By Ryan Brichant

    By Ryan Brichant “Disrupting” traditional business models might be hot talk for start-ups pitching investors, but in the world of manufacturing, transportation, energy and similar sectors, real “disruption” of production and facilities due to cyberatta …

  • By Neil Huntingdon

    By Neil Huntingdon Consumers are becoming increasingly concerned as technological advancements offer more convenience at the cost of our privacy. One particularly controversial innovation is facial recognition technology, which utilizes artificial inte …

Industry White Papers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network....

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest

Share This