Latest Cybersecurity Technical Articles

Categories

Disaster Recovery Plan and Strategy in Case of IT/OT Equipment Failure

Disaster Recovery Plan and Strategy in Case of IT/OT Equipment Failure

Failures are never the goal of any industrial operation. But when disaster strikes, it’s always better to have a mitigation plan in place well in advance of the event to ensure timely recovery.


A Hands-on Walkthrough of MQTT Protocol Using the paho-mqtt Open Source Library

A Hands-on Walkthrough of MQTT Protocol Using the paho-mqtt Open Source Library

No more IIoT buzzwords! This article aims to walk through an implementation of MQTT using the paho-mqtt library using nothing more than your local machine and some simple Python programming.


Cybersecurity for Industrial Control Systems

Cybersecurity for Industrial Control Systems

Cybersecurity is all about processes and people. A lot of threats can be mitigated through technology, but only if people understand how cybersecurity affects control systems and related technology.


Addressing Common Industrial IoT Cybersecurity Risks For Control Systems

Addressing Common Industrial IoT Cybersecurity Risks For Control Systems

Addressing cybersecurity threats introduced by IIoT technology and devices can quickly seem overwhelming. However, an understanding of the risks can lead to some straightforward countermeasures.


Introduction to Network Routers for Industrial Applications

Introduction to Network Routers for Industrial Applications

Network routers are designed to route and pass information between a system of connected computers and devices. Learn about the role of routers in industrial applications and how to properly maintain them.


Introduction to Servers for Industrial Applications

Introduction to Servers for Industrial Applications

Servers are vital to the flow of information in and around organizations, acting as a hub for information transfer and storage. Learn about the role of servers in industry and the potential challenges that come with maintaining them.


Examples of IIoT Applications

Examples of IIoT Applications

By shaping new concepts and business models, the IIoT is bringing more efficiency and capacity to automated systems. Take a look at some of the ways the IIoT is revolutionizing the manufacturing and automation sectors. 


Cloud Computing and the Industrial Internet of Things

Cloud Computing and the Industrial Internet of Things

Over the last decade, cloud service providers have improved technology, particularly data security and integrity. These remain the top concern of many manufacturing businesses, but as improvements are rolled out, more and more companies are adopting cloud solutions. 


Blockchain in Industrial Control Systems and Implications for Engineers

Blockchain in Industrial Control Systems and Implications for Engineers

Blockchain recording can reduce risks associated with data transactions such as data theft and erroneous information. But what implications, if any, does blockchain hold for industrial control system engineers?


Introduction to Warehouse Management Systems (WMS)

Introduction to Warehouse Management Systems (WMS)

This article covers the definition of warehouse management systems (WMS), describing the basic functions and benefits.


Blockchain for Industrial Automation: Are We There Yet?

Blockchain for Industrial Automation: Are We There Yet?

Learn about how blockchain technology works, why it’s secure, and how to use it in industrial automation.


Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Centralized and decentralized computing have different cybersecurity needs. Let’s review the differences and some best practices.


Combining Machine Vision and Neural Networks in IIoT

Combining Machine Vision and Neural Networks in IIoT

As IIoT and Industry 4.0 continue to grow, so do its technologies. Machine vision is becoming more widely used in the industry, and IIoT pushes it to become more and advanced as time progresses.


IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT infrastructure is more susceptible to cyber-attacks than legacy infrastructure due to its cloud-based nature; this article covers attack vectors and best mitigating practices.


Devices and Equipment Used in Industrial Remote Monitoring

Devices and Equipment Used in Industrial Remote Monitoring

This article in our continuing series about remote monitoring covers equipment and devices necessary to establish a remote monitoring mechanism.


Types of Industrial Remote Monitoring Solutions and Processes

Types of Industrial Remote Monitoring Solutions and Processes

Learn about the different types of industrial remote monitoring and some of the various remote monitoring processes used in industry.


Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

This article discusses common implementations of UPS in control systems and important design considerations.


How are Robots Pushing Further Into Automotive Manufacturing?

How are Robots Pushing Further Into Automotive Manufacturing?

Learn about how various types of robots are currently being deployed in the automotive sector and some of the challenges they face on the factory floor.


Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.