Cybersecurity

Articles

Cybersecurity

How hardened is industrial Ethernet?

The evolution of IoT has challenged security issues, while keeping mission critical networks mobile and fast
Eesco 63f3f85742ee9
Eesco 63f3f85742ee9
Eesco 63f3f85742ee9
Eesco 63f3f85742ee9
Eesco 63f3f85742ee9
Cybersecurity

EESCO earns Innovation Award for cybersecurity fix for critical infrastructure

How automation distributor leveraged Rockwell Automation and Cisco technology to acquire federal funding for securing water/wastewater facilities
Cyber Alert
Cyber Alert
Cyber Alert
Cyber Alert
Cyber Alert
Industry News

Rockwell Automation bolsters cybersecurity arsenal with acquisition of Verve Industrial Protection

Security center's OT cybersecurity offerings could strengthen defenses against industrial-control-system attacks
E Tech Group Acquires Automation Group
E Tech Group Acquires Automation Group
E Tech Group Acquires Automation Group
E Tech Group Acquires Automation Group
E Tech Group Acquires Automation Group
Industry News

E Tech Group acquires Automation Group

The two system integrators align on products and services, bolstering new regions with a combined focus on cybersecurity
computer-generated-illustration-of-3castles-representing-three-sites-and-illustrating-their-connections-and-defense-in-depth-and-zero-trust-security-models
computer-generated-illustration-of-3castles-representing-three-sites-and-illustrating-their-connections-and-defense-in-depth-and-zero-trust-security-models
computer-generated-illustration-of-3castles-representing-three-sites-and-illustrating-their-connections-and-defense-in-depth-and-zero-trust-security-models
computer-generated-illustration-of-3castles-representing-three-sites-and-illustrating-their-connections-and-defense-in-depth-and-zero-trust-security-models
computer-generated-illustration-of-3castles-representing-three-sites-and-illustrating-their-connections-and-defense-in-depth-and-zero-trust-security-models
Cybersecurity

2 common cybersecurity architectures

Practical advice for layering defense-in-depth and zero-trust approaches
Cybersecurity

How E Tech, AutomationPlus make cybersecurity approachable

System integrators provide cybersecurity context, encouragement, protection and detection for users in multiple process industries
Cybersecurity

Log4j response: Visibility is key

Open-source logging vulnerability renews software supply chain concerns
Siemens-PLC-with-digital-graphic-overlay
Siemens-PLC-with-digital-graphic-overlay
Siemens-PLC-with-digital-graphic-overlay
Siemens-PLC-with-digital-graphic-overlay
Siemens-PLC-with-digital-graphic-overlay
Cybersecurity

Defense-in-depth leads cyber strategy for OT security

Cyber-attacks on the automation infrastructure of facilities in the United States are real. Securing automation infrastructure can be a difficult task and is more difficult on...
Cybersecurity

UN Digital Summit focuses on cybersecurity

Cybersecurity was the main subject of the last day of the UN Digital Summit Internet Governance Forum (IGF) 2021 in Katowice, Poland.The first plenary session focused on the need...