Cybersecurity
New IETF standards: where IT security meets OT security
January 28, 2019
Two developing IT-based, IETF standards are aiming at helping to automate and simplify deployment of security processes for Industrial Automation and Control (IAC) devices and networks, as they become operational in machine builder, customer or system integrator’s processes.
Encryption technology provides solutions for Ethernet security
January 28, 2019
Cyber security is a considerable issue in the Industrial Networking that is demanding more and more attention. The IEEE 802.1AE standard, MACSec, is an efficient and high cost-performance ratio solution for Ethernet links to prevent “Man in the Middle” attacks and external threats from frame tampering.
Cyber security for Industrial Ethernet automation systems
January 28, 2019
Cyber security and protection of technical systems from attacks are key elements in the transition to digitization, especially in the automation industry. Due to a lack of regulations and knowledge in cyber security, many companies face uncertainty as to how to tackle this important issue.
ICS cyber security guide: industrial control systems
July 10, 2018
Five stages can be used to protect industrial networks, beginning with implementing a defense-in-depth strategy for industrial control systems. These stages (discover, assess, act, monitor and maintain) create a roadmap and detailed checklist to maintain the highest levels of security.
Designing industrial networks from a security point of view
July 10, 2018
Addressing security during the initial phase of network design is an important step towards creating more secure industrial control systems. Discarding outdated architectures in favor of granular network zones limits an attacker’s freedom of movement within a network and protects critical or vulnerable devices.
Five key considerations for secure remote access solutions
July 10, 2018
OEMs and machine builders require a secure, easy-to-use, and scalable remote access solution for machines deployed in the field. Traditional VPN and RDC solutions are cumbersome, but new solutions backed by a cloud-based management infrastructure can provide ease-of-use, flexibility, and scalability.