Greenfield
Factory Automation
Bassett
Batch Processing
Hand
Process Automation
Reynolds
Packaging Automation
Campbell
On the Edge

Security

Leadership Print Profile |

Wonderware by Schneider Electric

Belden to Acquire Tripwire
News
|

Belden to Acquire Tripwire, a Leader in Cybersecurity, for $710 Million

The company expects to incorporate Tripwire technology into selected Belden products to help customers deploy and secure the Internet of Things.
Full Article
E-Book Special Report
IT Delivers on Automation’s Promise
IT Delivers on Automation’s Promise

Sign up to receive timely updates from the editors at Automation World and download this FREE Special Report on the transformative power of data in manufacturing. By integrating information and automation technologies, manufacturers are finally achieving major gains in productivity from their automated systems.

A Different Approach to Industrial Security
Blog Post |

A Different Approach to Industrial Security

Borne out of seven years of research and development inside Boeing, the control system security methods developed there are now offered by Tempered Networks to all of industry.
Full Post
Controlling Access to Networked Devices
Blog Post |

Controlling Access to Networked Devices

With a focus on securing networked ICS devices, a session at PI North America’s annual meeting delivered specific industry best practices that you can put into practice today and plan around for stronger future network security.
Full Post
Leadership Print Profile |

Rockwell Automation

A Standard for the Internet of Things?
Blog Post |

A Standard for the Internet of Things?

Efforts in the U.K. to create an interoperability standard for the Internet of Things gets big backing from ARM, IBM, Intel, and VeriSign, among many others. But can it deliver?
Full Post
Feature Article
|

Securing Existing Control Networks: A Plan for Guarding Your Valuable Assets

Most discussions about securing control networks assume that you're starting with a clean slate.
Full Article
BYOD Security in Perspective
Blog Post |

BYOD Security in Perspective

As personal computing devices began entering the industrial workspace in significant numbers through corporate deployments and adoption of BYOD programs, IT and engineering departments raised red flags. But are mobile devices any less secure than other networked computing devices in the plant?
Full Post
Is Linux More Secure than Windows?
Blog Post |

Is Linux More Secure than Windows?

Though there are benefits to both operating systems, eternal vigilance is required to mitigate risk regardless of which OS you choose. Here's why.
Full Post
 Cybersecurity: Understand What You Seek to Protect
Blog Post |

Cybersecurity: Understand What You Seek to Protect

All the alarms in the world won't help if you put them in the wrong place. When it comes to industrial control system security, your biggest issue is determining what data to secure.
Full Post

Pages

Newsletters

Don't miss intelligence crucial to your job and business!
Click on any newsletter to view a sample. Enter your email address below to sign up!
Each newsletter ranges in frequency from once per month to a few times per month at most.