Articles

on 'SCADA'

121-140 of 166 < first | | | last >
  • Security is more than hating Microsoft

    In his June editorial for CONTROL, Editor in Chief Walt Boyes believes we are picking unfairly on the security flaws of Microsoft, while ignoring the wider implications of the problem for process automation.

    06/01/2005
  • On the bus: Design hurdles to fieldbus technology

    Ian Verhappen, Chair of the Foundation Fieldbus User Group and Vice President of Standards for ISA, offers his perspective and experience on the digital fieldbus network in this exclusive for DigitalField Insider.

    05/30/2005
  • Ten steps to secure control systems

    This "special to the web" article summarizes the 10 most important design and process principles that, while not guaranteed to secure a system, ensure your control systems are as secure as practical.

    05/12/2005
  • The cyber security assessment methodology

    Check out the methodology behind cyber security in this "special to the web" article by Jay Abshier, and assess your network’s intrusion protection/detection plan.

    05/12/2005
  • Dispelling the myths of HART-enabled devices

    Even though millions of HART-enabled field devices are installed in locations around the world, myths and misconceptions about this powerful technology for control systems abound.

    04/19/2005
  • Security could put process control under IT

    With new technology and strategies being developed to protect industrial systems from current and future threats, process control needs to figure out where it's going, according to IA Insider's Andrew Bond.

    04/12/2005
  • Patching SCADA systems

    Since the SCADA community is forced to live with unpatched systems with many known vulnerabilities, compensating security controls are required, according to this "special to the web" article by Dale Peterson

    04/11/2005
  • Digital data recorders deliver

    This month's Technically Speaking column compares mechanical, analog and digital recorders for data acquisition and concludes that local data logging can be the easiest way to satisfy regulatory requirements.

    03/29/2005
  • Hackers target U.S. power grid

    Government quietly warns utilities to beef up their computer security over heightened concerns that electric companies have failed to adequately fortify defenses against a potential catastrophic strike.

    03/25/2005
  • In the trenches of Fieldbus War II

    Like the 20th Century’s Great Conflict, the first Fieldbus War never really ended. But what will the outcome be this time? CONTROL writer Ian Verhappen takes an educated guess on how the battle may turn out.

    03/01/2005
  • Making a HART connection

    This "special to the web" aricle is designed to increase your knowledge about the HART Field Communications Protocol. Fnd out its benefits and dispel the myths surrounding this powerful technology.

    02/23/2005
  • Fieldbus is here - are you ready?

    Digital-based protocols, such as those used by fieldbus technology, are finding their way into a wider range of plant automation technologies. Can they be implemented at your plant?

    Joe Conklin, Fieldbus Foundation
    02/23/2005
  • The communications nexus

    There is a point where field communications and security meet. Editor in Chief Walt Boyes comments on what to do when you get there in this "special to the web" exclusive for DigitalField Insider.

    02/23/2005
  • Server-based DAQ/HMI system cuts seat charges

    To eliminate seat charges for additional HMI terminals across the country, WPS Energy has developed its own web-based data acquisition and HMI system that is applicable across the process control industry.

    02/21/2005
  • Control software opens up, prices come down

    Senior Technical Editor Rich Merritt showcases the latest software offerings that are becoming more open to the web, networks and fieldbuses in this month's Product Roundup of control software products.

    02/21/2005
  • How vulnerable is your SCADA system?

    Maj. Barry Charles Ezell, Ph.D., US Army, asserts that the same theory, model and methods used to quantify vulnerability to critical military infrastructure may be used to assess vulnerability to SCADA.

    02/09/2005
  • Confronting digital espionage

    Where does defending against digital espionage fall on your priority list? See what cybercrime experts recommend as the best steps you can take to secure your company's manufacturing processes.

    02/09/2005
  • Securing IP control protocols

    Is it impossible for all SCADA IP control protocols to implement a common security protocol? This "special to the web" article by SCADA security consultant Dale Peterson, says the answer is in the question.

    02/09/2005
121-140 of 166 < first | | | last >