Latest Security & Access Technical Articles

Categories

An Engineer Explains the Hexadecimal and Octal Number Systems

An Engineer Explains the Hexadecimal and Octal Number Systems

Computers understand values as long strings of binary bits, but we humans convert them to other systems for convenience. Decimal makes sense, but what about hexadecimal and the lesser-known octal systems?


Exploring 4 Popular Machine Learning Algorithms for Industrial Applications

Exploring 4 Popular Machine Learning Algorithms for Industrial Applications

Machine learning is a subset of AI that allows a machine to learn using past data. Learn about the two categories of machine learning as well as four major machine learning models often used in industrial applications.


Introduction to Network Switches for Industrial Applications

Introduction to Network Switches for Industrial Applications

Industrial network switches connect automation equipment, controllers, and other such devices. Learn about unmanaged, managed, and PoE enabled switches, as well as the differences between switches, routers, and hubs.


Memory: A Challenge on the Road to Industry 4.0

Memory: A Challenge on the Road to Industry 4.0

Memory for data is among the most pressing challenges to Industry 4.0. Given the evolving nature of Industry 4.0 and associated memory solutions, however, some memory-based trends are becoming apparent.


Teardown: What’s Inside a Human-machine Interface (HMI)?

Teardown: What’s Inside a Human-machine Interface (HMI)?

Human-machine interfaces, or HMIs, provide visual process data and allow access to process parameters and diagnostics information. What’s inside these touchscreen displays, and how do they actually work?


Lock-out-tag-out (LOTO) Devices for Industrial Safety

Lock-out-tag-out (LOTO) Devices for Industrial Safety

One of the most visible elements of industrial safety is the use of lock-out-tag-out (LOTO) devices, familiar to those with experience. But, if you are new to the workforce, a brief introduction may be helpful.


Protecting Control Systems with Safety Instrumented Systems (SIS)

Protecting Control Systems with Safety Instrumented Systems (SIS)

Safety is of utmost importance in the day-to-day operations of any system, especially a system where humans and machines work together. Learn all about Safety Instrumented Systems and what it takes to keep workers safe, and the system running smoothly!


How Remote Access is Advancing in the Process Industries

How Remote Access is Advancing in the Process Industries

Due to the robust nature of process industries, there is a vast amount of data to read. Remote access can help parse data and has many additional benefits in these industries.


Considerations When Integrating Cobots Into a Facility

Considerations When Integrating Cobots Into a Facility

What are some steps to consider before integrating a cobot, such as Universal Robots, into a facility?


Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Centralized and decentralized computing have different cybersecurity needs. Let’s review the differences and some best practices.


IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT infrastructure is more susceptible to cyber-attacks than legacy infrastructure due to its cloud-based nature; this article covers attack vectors and best mitigating practices.


Protocols for Industrial Remote Monitoring

Protocols for Industrial Remote Monitoring

Dive into why protocols are essential in industrial remote monitoring along with the most common types of open protocols seen in facilities.


Devices and Equipment Used in Industrial Remote Monitoring

Devices and Equipment Used in Industrial Remote Monitoring

This article in our continuing series about remote monitoring covers equipment and devices necessary to establish a remote monitoring mechanism.


Types of Industrial Remote Monitoring Solutions and Processes

Types of Industrial Remote Monitoring Solutions and Processes

Learn about the different types of industrial remote monitoring and some of the various remote monitoring processes used in industry.


Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

This article discusses common implementations of UPS in control systems and important design considerations.


Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


The Evolution of Autonomous Mobile Robots

The Evolution of Autonomous Mobile Robots

What are autonomous mobile robots and how did they come to be a crucial part of the industrial manufacturing industry?


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.


Securing SCADA Systems from Cyber Attacks

Securing SCADA Systems from Cyber Attacks

Learn about the many ways cyber-attacks threaten SCADA systems, and what can be done to keep manufacturing and utility plants protected.


Digital Twinning and its Use in SCADA Systems

Digital Twinning and its Use in SCADA Systems

Learn all about Digital Twinning, and how this new technique can change the way we do a number of industrial operations!