All controlglobal.com Blogs

The real cost of control system cyber security– and it isn’t cheap

There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the “benefits”. There have already been more than 350 actual control system cyber incidents.

International Standards – IEC, ISO and ITU

All of us are conscious that international standards play an important role in the design and implementation of automation and control systems as these are the areas in which we are most closely aligned. However in addition to automation standards the IEC and ISO also develop a wide range of...

Unlocking the Secrets of Uranium Dioxide’s Thermal Conductivity

Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance. 

Auto Tuners and Adaptive Control Recommendations Tips

Software for auto tuning and adaptive control provide the opportunity to identify key loop dynamics besides providing a sound fundamental and automated basis for getting the best PID settings. Presented are uses of the knowledge gained and the setup of the automation system and testing/monitoring of PID performance to get...

Another Washington think tank paper on critical infrastructure – another miss

The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is “Understanding the threats to the most critical infrastructure while securing a changing grid”.

Cybersecurity: SWAMP Helps Find Software Vulnerabilities

The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities. 

Real hacks of critical infrastructure are occurring – information sharing is not working

Real ICS cyber incidents including cyber attacks against critical infrastructure ICSs continue to occur. Yet, ICSs continue to be connected to the Internet. Moreover, the information is not being adequately shared. Additionally, vulnerabilities such as Aurora are not being adequately addressed yet the government has made the information public.

Auto Tuners and Adaptive Control Perspective Tips

Automating any process can yield big improvements by eliminating human error and adding repeatability and predictability. The benefits are greatest when the best technology and practices are automated, the novice is protected against mistakes, and the specialist is enabled to capitalize on creativity and expertise.

The Unisys Ponemon study – is it actually relevant to ICSs

Unisys sponsored a report by the Ponemon Institute: “Critical Infrastructure: Security Preparedness and Maturity”. It is being widely quoted even thought there was little Operational input and many of the questions were not relevant control systems. Consequently, the results need to be questioned as to their relevance.

Wireless Design Considerations for Industrial Applications Application Manual

Wireless installations in industrial settings have different challenges and requirements than those found in the typical office environment. A new application guide jointly developed by Rockwell Automation and Cisco is one document to help you better understand what some of those challenges are and how to overcome them.