Industrial Cyber Security – Securing Operational Technology 101

Industrial Cyber Security – Securing Operational Technology 101

In the modern connected enterprise where your industrial systems are networked to your business systems (which they almost certainly are) and your business systems are Internet facing (again very likely) then your business systems should be regarded as a potential source of threat to the integrity, safety and security of your control systems. That threat should be properly managed.

Read More

Digital Security & Off-the-Shelf Solutions

Digital Security & Off-the-Shelf Solutions

Like physical security, the investment in digital security is a function of what we are trying to protect and the company's exposure if breached. It is not only a necessity to have a digital security system, but to also be keep abreast of the changes and threats that effect such security systems. Read about how the evolution of technologies put strong pressures on companies and operations, as well as the updates being made to common off-the-shelf digital security solutions.

Read More

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

The Olympic flag was handed to Prime Minister Abe to conclude the Rio de Janeiro Onlimpic Games. It is time for Japan must fully commit to protect the people of Japan and visitors from cyber-attacks. This article reviews the current regulations and what will be necessary to keep Japan prepared for the 2020 Olympic games, and beyond.

Read More

The Advent of Drones & the threats they bring

The Advent of Drones & the threats they bring

Recently, expert Jeff Melrose spoke at the prestigious security conference Blackhat in Las Vegas, Nevada on the topic of drones that can be bought off-the-shelf and used in cyber crime. Watch a James Bond parody on how drones can be used to implement a cone of silence on both stationary targets and moving targets.

Read More

Pokémon GO: reflections on the process industry

Pokémon GO: reflections on the process industry

Today’s platforms were designed before our youngest operators were even born. Considering the rate of change that we are experiencing, the gap in thinking processes from junior operator to senior operator is widening, and will continue to widen as time goes on. Pokemon GO is a great example of the rate of change and rapid advancement we can look forward to in the coming years.

Read More

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

Cybersecurity experts at Yokogawa headquarters provide a fit-for-purpose Network Healthiness Check Service, developed in 2015. The service is meant identify deviations from normal network behaviors so that appropriate preventive measures against attacks could be taken, and improved upon.

Read More

Yokogawa’s Alarm Management Solution Installed Across a Vast Network at one of Europe’s Largest Gas Fields

Yokogawa’s Alarm Management Solution Installed Across a Vast Network at one of Europe’s Largest Gas Fields

After careful design and implementation, Yokogawa delivered an efficient and effective alarm rationalization solution for one of Europe's largest gas fields, developed in parallel with the company’s strategic objective of continuous improvement that will be effective for many years to come. 

Read More

SecureIT - Cyber Security for Plug-ins

SecureIT - Cyber Security for Plug-ins

With web content becoming ever more dynamic, it’s now necessary for even casual users to be aware of Plug-in helper applications, and the vulnerabilities that they create. As the sophistication of hacker groups continues to grow, the dark side to Plug-in use becomes more threatening; as web Browsers inherently trust such Plug-ins, an unguarded backdoor if left open for unintended remote execution of malware. 

Read More

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Just like the human body, even a healthy and well-managed industrial plant is susceptible to catching a cold. When a major plant catches a cold, however, it can effect millions. Read our introduction to a our recent video explaining the parallels in the importance on monitoring and maintaining a healthy facility.

Read More

Implementing Alarm Management per the IEC-62682 Standard

Implementing Alarm Management per the IEC-62682 Standard

To improve alarm management globally, the International Society for Automation (ISA) issued the standard ANSI/ISA-18.2 in 2009. The International Electrotechnical Commission (IEC) uses ISA-18.2 as the basis for the international alarm management standard IEC-62682, which is becoming globally adapted since its release in 2013. Learn more from Marcus Tennant about the IEC-62682 and it's implementation.

Read More

How-To: Create Passwords that are Complex & Easy-to-Remember

How-To: Create Passwords that are Complex & Easy-to-Remember

It can be daunting to come up with and remember multiple passwords to meet the demands of complex password filters of the several e-businesses and social sites that we use everyday. But now using an easy to remember method you too can create complex passwords with the best security professionals. Learn from Jeff Melrose in our second article in our SecureIT series. 

Read More

SecureIT - Basic Cyber Defense

SecureIT - Basic Cyber Defense

The first article in a new security series: 'SecureIT.'  In this article, Jeff Melrose explains the various threats, key points, and simple tips in mitigating up to 85% of cyber intrusions. Learn about why it is necessary for all PC and mobile users to perform regular security administration functions, at the very least. 

Read More

GICSP: Reducing Risk and Improving Security

GICSP: Reducing Risk and Improving Security

When speaking across divisions and cultures, key points can be misunderstood or lost in translation. Specifically in the world of IT security and industrial automation, miscommunication can lead to disastrous outcomes. GICSP is the tool developed by SANS and GIAC to lessen this risk, improving communication and security in the world of cyber-security. 

Read More

Quick Tips on Information Protection and Security

Quick Tips on Information Protection and Security

The vast majority of us will be targeted for cyber-crime at some point in our professional life, especially those who are involved in the development or maintenance in critical infrastructure. What follows is a short overview of the common tactics that are used in stealing data , as well as simple and effective tips to protect yourself.

Read More