Greenfield
Factory Automation
Neil
Batch Processing
Hand
Process Automation
Reynolds
Packaging Automation
Campbell
On the Edge

Security

The Many Sides of Cybersecurity
Blog Post |

The Many Sides of Cybersecurity

Manufacturers are waking up to the fact that a control system breach is inevitable if the plant network is not protected.
Full Post
Securing Devices By Design
News
|

Securing Devices By Design

Mentor Graphics and Icon Labs make security a native component of the embedded operating system
Full Article
E-Book Special Report
IT Delivers on Automation’s Promise
IT Delivers on Automation’s Promise

Sign up to receive timely updates from the editors at Automation World and download this FREE Special Report on the transformative power of data in manufacturing. By integrating information and automation technologies, manufacturers are finally achieving major gains in productivity from their automated systems.

News
|

Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach

The three companies will implement the joint SecurePlant initiative at about 50 Shell plants over the next three years to standardize cybersecurity measures for the global oil producer.
Full Article
The Impact of Piracy on SCADA
Blog Post |

The Impact of Piracy on SCADA

The problem of software piracy doesn't just affect consumer software. Industrial software, SCADA in particular, is increasingly being pirated and that can negatively impact people and processes.
Full Post
Asset Identification Cybersecurity
News
|

Asset Identification Cybersecurity

By identifying addressing information in protocols, as well as understanding the commands being sent and received on the network, asset and network identification cybersecurity adds new depth to indus
Full Article
Leadership Print Profile |

Schweitzer Engineering Laboratories

Leadership Print Profile |

Inductive Automation

Industrial Network Anomaly Detection
Blog Post |

Industrial Network Anomaly Detection

Control system security branches out from standard IT best practices targeting specific industrial applications.
Full Post
Justifying Cybersecurity: 3 Ways That Pay for Themselves
Blog Post |

Justifying Cybersecurity: 3 Ways That Pay for Themselves

Security doesn't exist in a vacuum. Tasks that improve security also increase availability and reliability.
Full Post
Los Alamos Laboratories technology is being licensed by Whitewood Encryption Systems.
Blog Post |

Promise of Real-Time Encryption at High Data Rates

After 20 years of development, Los Alamos National Laboratories is licensing cybersecurity technology based on quantum systems. If implemented on a wide scale, quantum key distribution technology could be the next frontier for truly secure industrial data systems.
Full Post

Pages

Newsletters

Don't miss intelligence crucial to your job and business!
Click on any newsletter to view a sample. Enter your email address below to sign up!
Each newsletter ranges in frequency from once per month to a few times per month at most.