Cybersecurity from above: A mini-series

Dec. 1, 2021

It's true that cyber-probes, -intrusions and -attacks are always evolving, with new cyber-threats emerging all the time. However, it's also true that the most effective protections and responses are remarkably consistent over the years, and even serve as the foundation for new cybersecurity solutions. Passwords and authentications, segmenting networks with firewalls, and regularly examining data and communications traffic for anomalies already shield process applications against breaches and damage. However, just as mastering classic recipes eventually inspires new innovations, cybersecurity best practices can also lead to new protections and effective responses to new threats.

Cybersecurity from scratch

Learn how Colorado's East Cherry Creek Valley Water and Sanitation District is upgrading the PLCs, RTUs, radios, SCADA system and cybersecurity in its water treatment system with Open Secure Automation (OSA) units from Bedrock Automation. Read more.

Overcoming (human) inertia for cybersecurity

The most crucial cybersecurity task is motivating managers and training staff to follow good cybersecurity practices—even though it remains persistently difficult to accomplish. Maverick Technologies' Bruce Billedeaux and Robert Henderson explain how to motivate individuals and organizations to adopt and practice cybersecurity tools and skills. Read more.

 Simplify cybersecurity with publish-subscribe protocol

Adopting publish-subscribe protocols like MQTT and others not only simplifies networking, it can also streamline cybersecurity. Here's how Michigan-based Waterford Township is upgrading its water/wastewater controls and SCADA system with MQTT publish-subscribe protocol running on Opto 22's groov EPIC controllers. Read more.

Cybersecurity staples bear repeating

Many best practices for cybersecurity may be familiar, but continual reminders are needed to make them effective—and enable new ones to be added later. Here's a rundown of some of the staple cybersecurity best practices. Read more. 

Integrators make cybersecurity approachable

System integrators E Tech and AutomationPlus provide cybersecurity context, encouragement, protection and detection for users in multiple process industries. Here they discuss some best practices they're using. Read more.

Cybersecurity? Just another process control job

Marty Edwards of Tenable calls for thinking of cybersecurity as a process variable to be measured, viewed and controlled. Here's his argument. Read more.

 Straight talk on cybersecurity

Experts from Acquired Data Solutions, Emerson and Rockwell Automation provide practical advice on establishing and maintaining cybersecurity protections. Read more.

About the author: Jim Montague
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...