Controlling Interests Editors' Blog
BYOD security issues raise important questions core to cyber security.
Even after the disastrous 2010 BP oil spill, blowouts from underwater oil wells continue to pose a dangerous risk for drilling rigs.
Needing only tiny amounts of power, anisotropic magnetoresistive (AMR) sensor ICs can detect magnetic fields as weak as 7 Gauss.
A hacker helped authorities disrupt at least 300 cyberattacks.
Hackers are exploiting an Internet Explorer vulnerability that was recently left unpatched in Windows XP. Microsoft doesn't plan on doing anything about the problem.
A U.S. grand jury has indicted five Chinese for stealing industrial secrets via computer from U. S. companies
The ISA Cybersecurity Conference 2014, Detroit, June 9 - 12, 2014, will help help attendees learn how they can protect their industrial networks and controls systems against cyber threats.
Capital projects need to scale up and down quickly, making cloud-based project management solutions a good fit
ISA and Maverick Technoloies have joined forces to offer a 90-minute webinar on control systems migration. on May 29. The discussion will focus on system migration challenges and show how front-end loading streamlines the process. This could be a must-do, even if you don't like webinars.
To celebrate Earth Day, Phoenix Contact (www.phoenixcontact.com) will unveil its new combined cooling, heating and power (CCHP) system, and its president, Jack Nehlig, will ceremonially disconnect from the electric grid. The CCHP system is a natural gas, fixed microturbine system that will generate enough electricity to power the company’s Americas...