Topics of the Day
Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.
Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.Making Time for Security
Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.
By Stefan Liversidge Cyberattacks have been making the headlines daily, and the heat is on for critical infrastructure and other industrial organizations to do something about it. Building cyber resiliency at any speed puts a lot of pressure on an orga …
When you email a friend, you don’t have to worry about whether they use Gmail, Outlook, Yahoo or some other email provider. You just enter their email address, write your message and hit send. The reason this works is because there are layers of standardized protocols all email clients have adopted so messages can seamlessly fly between users regardless of which client they choose.
How does your company’s perception of ICS risk compare to that of other organizations? How are other asset owners defining the boundaries between OT systems and external systems? How do your ICS security roadblocks compare to others? Where does your company rank in terms of managing OT/IT convergence?