All Blogs

Cybersecurity: SWAMP Helps Find Software Vulnerabilities

The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities. 

Real hacks of critical infrastructure are occurring – information sharing is not working

Real ICS cyber incidents including cyber attacks against critical infrastructure ICSs continue to occur. Yet, ICSs continue to be connected to the Internet. Moreover, the information is not being adequately shared. Additionally, vulnerabilities such as Aurora are not being adequately addressed yet the government has made the information public.

Auto Tuners and Adaptive Control Perspective Tips

Automating any process can yield big improvements by eliminating human error and adding repeatability and predictability. The benefits are greatest when the best technology and practices are automated, the novice is protected against mistakes, and the specialist is enabled to capitalize on creativity and expertise.

The Unisys Ponemon study – is it actually relevant to ICSs

Unisys sponsored a report by the Ponemon Institute: “Critical Infrastructure: Security Preparedness and Maturity”. It is being widely quoted even thought there was little Operational input and many of the questions were not relevant control systems. Consequently, the results need to be questioned as to their relevance.

Wireless Design Considerations for Industrial Applications Application Manual

Wireless installations in industrial settings have different challenges and requirements than those found in the typical office environment. A new application guide jointly developed by Rockwell Automation and Cisco is one document to help you better understand what some of those challenges are and how to overcome them.

Consortium for the Advancement of Cyber Thinking and Strategy (C-ACTS)

I will be attending the Air Force Research Institute’s C-ACTS meeting on July 17th. The intent of the meeting is to identify and highlight strategic issues, foster research, collaboration, and develop educational programs that explore national security and military operations in cyber space.

Call for presentations for 2014 ICS Cyber Security Conference

For the first time, we are having a formal call for presentations for the 2014 ICS Cyber Security Conference -  The call for presentations can be found at

Google Aurora vs ICS Aurora – An industry and DHS debacle

July 3, 2014 DHS made the INL Aurora information public despite the request being for the Google Aurora information. With the exception of two utilities, industry has still not responded to mitigate this problem. DHS claims they released the information because the information is old and industry has addressed the problem.

WINA 2014 Wireless Survey

Gaining an understanding of the changes in the rapidly evolving industrial wireless sector will be valuable to not only manufacturers but also end users and engineering companies to help determine longer term planning. This annual survey from WINA is a valuable tool to assist in gathering this information.

Process Control Improvement Recommendations Tips

Here we look at how to make sure the measurement system is able to provide the analysis, metrics, and control needed for process control improvement. Also outlined is the opportunity sizing and assessment process, the use of statistical tools, the tracking down of the source of variability, and the finding...