Building cybersecurity firewalls

Why and how to secure industrial control and safety systems at every conduit.

Cybersecurity 3 170622

Cybersecurity is all the rage now with everyone wondering if someone is peeking under their petticoats or will hack their control system and take over their process, a la Stuxnet, leading to a disaster. This is an important issue that requires a careful approach of engineering analysis and design to keep the barbarians at the gate and out of our kingdom. IT networks are being subjected to an increased level of cyber threats, and all the pundits are predicting that industrial control systems (ICS) are next, with a good dose of doom and gloom. When the corporate or enterprise IT network is connected (directly or indirectly through the plant network) to ICS network and/or…

Full Story

Resources

State of Technology: Flow measurement

cgsot 1705 DS EGThe latest flow measurement trends, technology and implementations are detailed in this new ebook from the editors of Control. Download it here.

Our latest issue: June 2017

June Cover EGIn our June issue, we explore alternative paths for moving data from the field and plant floors to enterprises and the cloud by skirting the usual control routes. Read the issue.

Voices: Ask The Experts

Ask the experts: PID terminology causes confusion

Definitions of terms evolve as control technology advances and proprietary algorithms merge.

I am a Instrumentation engineer from India. For the past 10 years, I have referred to your Instrument and Automation Engineers’ Handbook, also known as "the bible for instrumentation" in India. I have a problem in understanding PID controllers. My questions are about interacting,…

Full Story

Most Recent

  • Procedural automation everywhere

    By Ian Verhappen

    ISA released the ISA-106 “Procedure Automation for Continuous Process Operations” initial Technical Report (TR) defining models and terminology in August 2013, and several manufacturers have implemented their interpretation of this document within their control systems. The TR models define…

    Full Story
  • Building cybersecurity firewalls

    By William Mostia, Jr., P.E.

    Cybersecurity is all the rage now with everyone wondering if someone is peeking under their petticoats or will hack their control system and take over their process, a la Stuxnet, leading to a disaster. This is an important issue that requires a careful approach of engineering analysis and design…

    Full Story
  • Ask the experts: PID terminology causes confusion

    I am a Instrumentation engineer from India. For the past 10 years, I have referred to your Instrument and Automation Engineers’ Handbook, also known as "the bible for instrumentation" in India. I have a problem in understanding PID controllers. My questions are about interacting,…

    Full Story
  • DeltaV Mobile brings process data beyond the control room

    Riding herd on a DCS takes more than alarm notifications and static screen shots, even when you need to do it on a smart phone. So, Emerson Automation Solutions  has developed a mobile platform that truly reflects users’ real-world priorities, culminating in the release of DeltaV Mobile.

    Full Story
  • Extruder gets tubular with IIoT

    By Jim Montague

    Regular experts know a lot, but veteran experts know how much they still have to learn. Such is the case with Teel Plastics Inc. in Baraboo, Wis., which has been specializing in custom, extruded plastic tubing and profiles for more than 60 years, but still seeks user input and external know-how in…

    Full Story
  • Resource guide: cybersecurity cornucopia

    NIST novel on ICS security  This recently updated, 247-page opus, "Guide to industrial control systems (ICS) security," was written by Keith Stouffer and his colleagues at the National Institute of Standards and Technology (NIST), and provides a comprehensive overview of cybersecurity as it…

    Full Story

Latest Products