All controlglobal.com Blogs

Selected Sessions at 2014 October ICS Cyber Security Conference

The 14th ICS Cyber Security Conference (www.icscybersecurityconference.com) will have 5 major themes: Actual ICS cyber incidents; ICS cyber security standards; ICS cyber security solutions; ICS cyber security demonstrations; and ICS policy issues. The Conference focuses on what has REALLY happened and what is being done that affects the CONTROL SYSTEMS.

2014 Silicon Valley Cyber Security Summit – no ICS focus

August 12th, the Silicon Valley Leadership Group hosted the 2014 Silicon Valley Cyber Security Summit. The attendance was very high level with 2 US Senators, 2 US Representatives, senior leadership from McAfee, Symantec, RSA, etc. There was almost no ICS focus or discussions though there were discussions about the need for...

The real cost of control system cyber security– and it isn’t cheap

There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the “benefits”. There have already been more than 350 actual control system cyber incidents.

International Standards – IEC, ISO and ITU

All of us are conscious that international standards play an important role in the design and implementation of automation and control systems as these are the areas in which we are most closely aligned. However in addition to automation standards the IEC and ISO also develop a wide range of...

Unlocking the Secrets of Uranium Dioxide’s Thermal Conductivity

Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance. 

Auto Tuners and Adaptive Control Recommendations Tips

Software for auto tuning and adaptive control provide the opportunity to identify key loop dynamics besides providing a sound fundamental and automated basis for getting the best PID settings. Presented are uses of the knowledge gained and the setup of the automation system and testing/monitoring of PID performance to get...

Another Washington think tank paper on critical infrastructure – another miss

The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is “Understanding the threats to the most critical infrastructure while securing a changing grid”.

Cybersecurity: SWAMP Helps Find Software Vulnerabilities

The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities. 

Real hacks of critical infrastructure are occurring – information sharing is not working

Real ICS cyber incidents including cyber attacks against critical infrastructure ICSs continue to occur. Yet, ICSs continue to be connected to the Internet. Moreover, the information is not being adequately shared. Additionally, vulnerabilities such as Aurora are not being adequately addressed yet the government has made the information public.

Auto Tuners and Adaptive Control Perspective Tips

Automating any process can yield big improvements by eliminating human error and adding repeatability and predictability. The benefits are greatest when the best technology and practices are automated, the novice is protected against mistakes, and the specialist is enabled to capitalize on creativity and expertise.