Blogs

BP Agrees to Pay $4.5 Billion to Resolve Criminal Claims on Deepwater Horizon

You may have seen this elsewhere, but just in case, BP today announced Nov. 15 that it’s “agreed with the United States government, subject to court approval, to resolve all federal criminal charges and all claims by the Securities and Exchange Commission (SEC) against the company stemming from the Deepwater...

Safety Conference in Edmonton November 27-29, 2012

IDC Technology is hosting a conference and two half-day workshops in Edmonton later this month with workshops presented by both Paul Gruhn on Safety system and John Cusimano on "Assessing the Security of Industrial Control Systems Using Threat Modeling" Tuesday November 27.

IT Rules for Cybersecurity of control systems

How far should we go in adopting IT type rules for the management of cybersecurity on control systems. Will treating a control system as just another set of PCC's (from the IT perspective) cause more problems?

Safety Function Blocks

Are you comfortable using advanced safety logic that is embedded in a safety system? Having pre-engineered MooN or CEM function blocks can save engineering and testing time, but deviates from the traditional code-intensive approach. If the supplier is IEC 61508 certified, do you have confidence that the advanced safety function...

News You May Have Missed This Week

Thanks to multiple ways to keep informed available and thehard limit of 24 hours in every day, keeping up with the news is harder thanever. So as a semi-regular service of the SoundOff! Team, we bring you a fewstories you may have missed that you'll wish later you hadn't.

ISA Automation Week 2012: Innovation in Orlando

I'm not usually much of a Disney fan. The characters from Snow White onward were fantastic, but they were almost always pure good or all bad. Unfortunately, this black-and-white ethos always seemed kind of flat and artificial, like early Superman or DC comics or Lawrence Welk's robotic performers.

BYOD: 10 Tips Enterprises Can Use to Protect Their Data

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient.

SSL Security Flaw in RuggedCom Industrial Networking Devices

According to a security researcher from security startup Cylance, industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users.

Honeywell Takes Aim at Security & Safety

Unless you've been living in a cave or completely focused on the fate of your favorite baseball or basketball team, you're bound to know that the issue of cybersecurity is heating up. If Stuxnet wasn't enough, now there's its evil twin Flame to add to your worries about your computer...

Inside Fukushima and Preventing Future Disasters

It's been exactly a year and a day since Japan's devastating earthquake and tsunami. So, in addition to all the lives lost and communities swept away in northeastern Japan, it's also been almost a year since the Fukushima Daiichi nuclear plant was damaged to the point that several of its...