10 principles for securing control systems
KEMA Consultant Jay Abshier takes an unbiased and highly detailed look at where plant security really is, and what is being done to better protect our process automation systems and infrastructure.
OPC considerations for network security
Cyber security is necessary for process control networks if they intend to integrate with business networks. But, it seems that whenever
IT meets real-time control systems, trouble usually erupts. This article shows that while industrial cyber security is complex, there are ways to keep your plant assets protected.
Security hot spots: Where protection matters most
The security control room is often seen as the trophy of an integrated security management system. But does a lot of flash and noise equal effectiveness? This series of articles offers simple steps on how your can protect and improve the security of your control room, data
center, and even loading dock.
Five things industry can learn from hackers
Hackers secure their computers better than the rest of the industrial computing community. This article suggests ways industry can learn from
their hacking techniques and protection skills to improve network security.
Bad assumptions lead to bad security
Embedded security expert Eric Uner outlines some assumptions he believes developers make that lead to the design of wired and wirelessly
connected embedded systems with inadequate security.
ISA releases new book on electronic security for manufacturing and control systems
This resource serves as a tool for self-study and in obtaining familiarity with electronic security systems as applied in an industrial setting.
Lawmaker doesn't rule out cyber security regulation
The U.S. government needs a better handle on the cyber security risk, particularly to Internet-powered SCADA systems that control such critical
infrastructure as dams, electricity grids and water and sewer systems.
News and opinion on best practices, future trends, security standards, vendor offerings, and all other issues related to SCADA security.
The all new directory of lost companies
Identified in this new Appendix are more than 200 companies whose name,
ownership, or product line has changed significantly over the period
from 1990 to 2005. Find the company you're looking for here.