1660317104195 Ct2111coverhero

Cybersecurity from above: A mini-series

Dec. 1, 2021

It's true that cyber-probes, -intrusions and -attacks are always evolving, with new cyber-threats emerging all the time. However, it's also true that the most effective protections and responses are remarkably consistent over the years, and even serve as the foundation for new cybersecurity solutions. Passwords and authentications, segmenting networks with firewalls, and regularly examining data and communications traffic for anomalies already shield process applications against breaches and damage. However, just as mastering classic recipes eventually inspires new innovations, cybersecurity best practices can also lead to new protections and effective responses to new threats.

Cybersecurity from scratch

Learn how Colorado's East Cherry Creek Valley Water and Sanitation District is upgrading the PLCs, RTUs, radios, SCADA system and cybersecurity in its water treatment system with Open Secure Automation (OSA) units from Bedrock Automation. Read more.

Overcoming (human) inertia for cybersecurity

The most crucial cybersecurity task is motivating managers and training staff to follow good cybersecurity practices—even though it remains persistently difficult to accomplish. Maverick Technologies' Bruce Billedeaux and Robert Henderson explain how to motivate individuals and organizations to adopt and practice cybersecurity tools and skills. Read more.

 Simplify cybersecurity with publish-subscribe protocol

Adopting publish-subscribe protocols like MQTT and others not only simplifies networking, it can also streamline cybersecurity. Here's how Michigan-based Waterford Township is upgrading its water/wastewater controls and SCADA system with MQTT publish-subscribe protocol running on Opto 22's groov EPIC controllers. Read more.

Cybersecurity staples bear repeating

Many best practices for cybersecurity may be familiar, but continual reminders are needed to make them effective—and enable new ones to be added later. Here's a rundown of some of the staple cybersecurity best practices. Read more. 

Integrators make cybersecurity approachable

System integrators E Tech and AutomationPlus provide cybersecurity context, encouragement, protection and detection for users in multiple process industries. Here they discuss some best practices they're using. Read more.

Cybersecurity? Just another process control job

Marty Edwards of Tenable calls for thinking of cybersecurity as a process variable to be measured, viewed and controlled. Here's his argument. Read more.

 Straight talk on cybersecurity

Experts from Acquired Data Solutions, Emerson and Rockwell Automation provide practical advice on establishing and maintaining cybersecurity protections. Read more.

About the author: Jim Montague
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.