Cybersecurity

A solid plan for cybersecurity

Chemical manufacturer Olin follows NIST and CIS directives, and adopts Armis software to build its OT/IT security platform
Wireless

Growing pains of industrial networks

More powerful networks mean cybersecurity vulnerabilities must be minimized
Cybersecurity

2024 Process Automation Hall of Fame: Joe Weiss’ winding river

A series of nuclear energy projects set Weiss on a journey to becoming an expert in control systems cybersecurity
Cybersecurity

Many players, one cybersecurity goal

ABB, Honeywell, Mission Secure and Phoenix Contact share their cybersecurity expertise
Cybersecurity

ISAGCA calls for joint security exercises, procedures and backups

ISA Global Cybersecurity Alliance shows how OT and IT can cooperate to defeat ransomware and other cyber-threats
Cybersecurity

Model cyber-threats, test responses—and collaborate

Consultant Accenture recommends simulating breaches to determine protections
Cybersecurity

Bake security into network designs

System integrator Malisko Engineering advocates examining early and look deeper where cybersecurity is needed, and automating its functions where possible
Cybersecurity

Pick the appropriate defense

System integrator Velta Technology uses holistic, role-based and improved remote access for security
Cybersecurity (alphabet) soup
Cybersecurity

Cybersecurity (alphabet) soup

Updated definitions of some of the most important cybersecurity concepts, threats and defenses
Cybersecurity

Basics before buzzwords

System integrator Interstates emphasizes that security infrastructures must come before the latest protections
Cybersecurity

Plan ahead to access intelligence

BW Offshore uses Claroty’s threat detection software, and Tata Steel use Acronis’ data protection and cybersecurity software