All Blogs

Guest Blogs

Contributing experts offer additional process automation and control industry knowledge in these blog posts. 

Off-site Insights

ControlGlobal.com's Off-site Insights Blog by Digital Engagement Manager Amanda Del Buono offers a break from our normal process automation control coverage to take a look at how the technology you use at work is utilized in so many other unique and innovative ways across other industries and throughout our everyday world.

Control Talk Blog

The Control Talk Blog provides guidance from a user's viewpoint on the design of automation systems, equipment, and piping for process control improvement. Details are offered on the selection and installation of PID controllers, control valves, variable speed drives, and measurements to maximize loop performance. The blogs are often more intensive and extensive and less vendor specific than a white paper. The goal is an advancement of the profession by sharing conceptual principle based knowledge.

Unfettered Blog

Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.

Controlling Interests Editors' Blog

Control's editors weigh in with timely insights and tidbits on goings-on in the process automation world, mostly news and technology but also interesting perspectives gleaned from our daily conversations with end users and the challenges of the craft.

The Great Kanduski: Best Practices in Industrial Networking

Ian Verhappen, a.k.a "The Great Kanduski," has 25+ years experience in instrumentation, controls and automation. He joins the editors of Control, Control Design and Industrial Networking to offer his perspectives and experiences on networks (including IP based ones), fieldbuses, wireless, and anything that has to do with field level devices (including process analysers). Much like our Industrial Networking magazine, the Great Kanduski serves the readers of Control and Control Design who are especially interested in fieldbuses, Ethernet, wireless, networking strategies and standards, and the cables, connectors, sniffers and other components that support them.
Unfettered Blog

Issues with Identifying Control System Cyber Incidents: MORS presentation

July 19, 2024
Government and industry organizations tend to under-report and under-share control system cyber incidents
Unfettered Blog

Webinar on securing critical infrastructure

June 21, 2024
The Tortora Brayda Institute held a roundtable event on June 18
Unfettered Blog

Identifying control system cyber incidents requires expertise not readily available and government reporting changes

June 12, 2024
Training to recognize control system incidents as being cyber-related is missing, allowing cyber incidents to continue to occur with potential or actual catastrophic consequences...
Unfettered Blog

Training for identifying control system incidents as being cyber-related

May 31, 2024
The peer-reviewed Micro Learning Module “Identifying Control System Cyber Incidents” was written in response to the lack of industry being able to identify control system incidents...
Unfettered Blog

Secure-by-design is not the same as safe-by-design – and people are being hurt

May 21, 2024
Cybersecurity is being addressed but without adequate safety engineering to account for unexpected system interactions
Unfettered Blog

The 2024 RSA Cybersecurity Conference: What wasn’t addressed can hurt you

May 17, 2024
Was the real scope of control system cyber incidents properly addressed?
Unfettered Blog

The origin of 'The original ICS/SCADA system cybersecurity conference'

April 30, 2024
The ICS Cybersecurity Conference started in 2002 as a cybersecurity conference for the control system engineers
Unfettered Blog

Guardians of critical infrastructure: Where are the control systems?

April 25, 2024
Infragard will be holding a session “Cyber Defenders: Guardians of Critical Infrastructure”, but there are critical issues with seminar’s agenda
Unfettered Blog

Exploiting remote access: The ultimate living off the land attack

March 20, 2024
Remote access can be a double-edged sword providing needed reliability improvement but also a potential vehicle for LOTL attacks
Unfettered Blog

The U.S. electric industry is not responding to cyber-vulnerable Chinese equipment

Feb. 29, 2024
The utility sector continues to ignore the cyber threat from Chinese equipment
Unfettered Blog

False process sensor data can be catastrophic but are not adequately addressed

Feb. 6, 2024
Although process sensors are the eyes and ears of industrial processes, they are often not included in cybersecurity programs
Unfettered Blog

Why is CISA not addressing the PLCs in the Unitronics PLC attack?

Dec. 13, 2023
The IRGC attack could be wider spread, as Unitronics PLCs may be rebranded and appear as different manufacturers and companies
Unfettered Blog

CISA’s response to Iran hacking control systems in US critical infrastructures is inadequate

Dec. 4, 2023
The U.S. is in an undeclared cyber war with Iran, including Iran cyberattacking U.S. control systems and IT networks
Unfettered Blog

OTORIO webinar on proactive measures to enhance cybersecurity ROI in OT/ICS environments

Nov. 29, 2023
Proactive measures to enhance cybersecurity in OT/ICS environments, emphasizing tangible ROI and aligning these efforts with broader business goals
Unfettered Blog

Iran hacks US water system: Observation and implications of a terrorist attack on US soil

Nov. 27, 2023
An Iranian-backed cyber group recently launched an attack on the Municipal Water Authority of Aliquippa, Pennsylvania