All Blogs

IEC61508 Second Edition – Summary of Changes Presentation

Safety systems are an important component of control systems and with the recent publication of the second edition of these documents so getting an understanding of some of the basic changes is certainly something that should be done.

Process Control Improvement Perspective Tips

The benefits from process control improvement originate from increases in process efficiency, flexibility, and capacity. Often, there is a tradeoff where an increase in flexibility or capacity is accompanied by a decrease in efficiency. Better measurements, process knowledge, online metrics, and an enhanced PID can provide a more intelligent and effective...

ICSs and the Internet – what is actually happening

Many ICSs are connected to the Internet and it isn’t expensive to find them. ICSs continue to be connected to the Internet even though they may not be cyber secure. Be careful what you ask for - you just might get it.

Massive Oil Spills: Are Drilling Rigs Still at Risk from Blowouts?

Even after the disastrous 2010 BP oil spill, blowouts from underwater oil wells continue to pose a dangerous risk for drilling rigs. 

Why the Bridge Still Needs to be Built Between Operations and IT

To many in the IT community, the gap in understanding industrial control system cyber security is gaping. I was drawn to a May 29th Dark Reading article titled “Large Electric Utilities Earn High Security Scores as the title seemed to be at odds with what I have seen.

Nanopower Magnetic Sensors Work Across Large Air Gaps

Needing only tiny amounts of power, anisotropic magnetoresistive (AMR) sensor ICs can detect  magnetic fields as weak as 7 Gauss. 

2014 ICS Cyber Security Conference – Mark Your Calendar

It’s official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta. As with previous ICS Cyber Security Conferences, the agenda will not be complete until shortly before the conference to accommodate the most...

Hacker Helps Forestall Cyberattacks on the U.S. Military, Congress and NASA

A hacker helped authorities  disrupt at least 300 cyberattacks.

Video game on hacking control systems

There will now be the opportunity to turn loose a generation of hackers honing their control system hacking skills on video games. According to the videogame trailer, the game simulates more than 60 different hacks from your cell phone where you can manipulate traffic signals, cause blackouts, etc.  

Microsoft XP Falls Victim to the Cybersecurity Wars

Hackers are exploiting an Internet Explorer vulnerability that was recently left unpatched in Windows XP. Microsoft doesn't plan on doing anything about the problem.