1660601735856 Top101802

Control's 10 most-read articles of January 2018

Feb. 2, 2018
Schneider Electric confirms first unguarded SIS cyber attack; Filtering a noisy signal; ABB shifts EPC business model

1. 2018 Readers' Choice Awards

We've now tabulated the Readers' Choice Awards 26 times, for more than a quarter century, and we're starting to see it as an institution—more than a habit, at least a tradition, and we think, a trusted repository of valuable information for process automation professionals who want to know which companies offer the best technology, according to their peers. Read more.

2. First cyber attack on unguarded SIS reported

Schneider Electric confirms FireEye, Dragos blog posts about Triton malware attack on isolated user's Triconex safety controller at critical infrastruture facility in the Middle East. Read more.

3. ABB shifts EPC business model

These shifts will cost its power grids, industrial automation, and oil and gas EPC businesses about $75 million each. Read more.

4. Filtering a noisy signal

Be wary when applying this imperfect solution to an all too common problem. Read more.

5. Interfaces lighten the load

Human-machine interfaces (HMIs) and operator workstations are simplifying, multitasking, and seeking "one pane of glass" as they multiply and go mobile. Read more.

6. Endress+Hauser allies with trio to aid digital oilfield

Partnership with Angus Measurement Services, TechnipFMC and its sales and service representative, Vector Controls, will help Endress+Hauser collaborate on helping oil and gas clients transition to the "digital oilfield" and Industry 4.0. Read more.

7. Is fieldbus dead?

Settling for less is fine for the simple minded and poorly led. Read more.

8. Software speeds water plant project

Aqua+ engineers exploit automated workflow, collaboration, error checking and documentation. Read more.

9. Location-based control adds interesting capabilities for mobile personnel

With existing applications ranging from self-driving cars to apps that serve coupons when you're facing a particular store shelf, how can anyone patent location-based control? Read more.

10. The best odds for beating cyber attacks

The head-in-the-sand, deer-in-the-headlights, non-approach to cybersecurity is giving way to the collaboration that will be needed to stay ahead of future threats. Read more.

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.