All Blogs

The Slow March of Technology

For the next few weeks, Managing Editor and blogger Nancy Bartels be reporting from the original Silicon Valley, the neck of land between the Firth of Forth to the east and the Firth of Clyde on the west, marked on one side by Edinburgh and the other by Glasgow.

Presentation at International Atomic Energy Agency (IAEA)

I will be giving a presentation December 8th at IAEA in Vienna on ICS cyber security at the IAEA Technical Meeting on Computer Security Topical Area Awareness for Nuclear Facilities.

Humorous Insights into Disturbances and being an Automation Engineer

What comes at you too fast? How do people know you are a process control engineer? What is more disturbing than talk shows? Is a flea market indicative of a project behind schedule? These and other questions you have not asked will be answered.

The arrogance of the US nuclear power industry - we don't want to look at everything

The Nuclear Energy Institute (NEI) has filed a rulemaking proposal with the NRC to REDUCE the number of systems and components to assess for cyber security. Given that nuclear plants are such high value targets and there are so many current malware attacks against control systems, this doesn't make any sense.

How can ICS cyber security risk be quantified and what does it mean to Aurora

There is little information on frequency of ICS cyber attacks. HAVEX and BlackEnergy have been targeting selected ICS vendor HMIs that could be used to give remote access to the attackers. Once your computer is owned there's not much the attacker can't do.

PID Structure Tips

Before the 1990s relatively few choices in PID structure were offered. There were also various supplier specific rules as to how to set the proportional mode and integral mode tuning settings to get proportional-only and integral-only control. A different model controller may have been needed for a different structure.

The power industry has unique technical needs in addressing cyber security - NOT!

The Convenor of IEC TC57 WG15 sent a note to ISA99 stating that the power industry organizations have additional or different security situations that are causing us to create our own security standards and guidelines. Other than for compliance reasons (NERC CIP), the power industry is NOT different than other...

Highlights from the 2014 ICS Cyber Security Conference

The highlights from the 2014 ICS Cyber Security Conference can be found at Conference presentations and discussions included actual ICS cyber incidents, new ICS cyber vulnerabilities, and new ICS cyber security technologies.

PID Form Trick or Treat Tips

Not knowing the implications of the PID Form in an existing control system being migrated or the PID Form learned in a University course can cause gross errors in the tuning parameters and potential instability. The PID Form predominantly used today is not the Form in most of the controllers...

HART - We have an App for that

Innovative HART communications specialty company ProComSol announced earlier this month that they now have an Android based application that when combined with their Bluetooth modem allows any Android Ice Cream Sandwich based system to be used as a handheld communicator for any HART 7 or earlier device.