Honeywell and Intel Security to collaborate on industrial cybersecurity
26 June, 2015Honeywell Process Solutions (HPS) and Intel Security have announced they will collaborate to help bolster protection of critical industrial infrastructure and the Industrial Internet of Things (IIoT).
Weak password encryption used in Rockwell HMI software
29 May, 2015Encryption algorithms for protecting user credentials in Rockwell's RSView32 software are outdated and sufficiently weak to be decrypted.
Simplifying industrial cybersecurity
12 May, 2015 by Glenn Johnson, EditorWhat's New in Process Technology interviews Chee Ban Ngai, who leads Honeywell's Industrial Cyber Security business in the Asia-Pacific region, and asks him about Honeywell's new Industrial Cyber Security Risk Manager system.
Honeywell launches proactive cybersecurity risk monitor
24 April, 2015Honeywell Process Solutions (HPS) has launched the first digital dashboard designed to proactively monitor, measure and manage cybersecurity risk for control systems.
Honeywell opens new cybersecurity research lab
02 April, 2015New lab to advance Honeywell's development and testing of technologies and software to defend industrial facilities from cyber attacks.
Secure 'no-wireless' zones now possible
16 February, 2015Fluke Networks has released a major upgrade to its AirMagnet Enterprise wireless security solution to immediately identify all rogue wireless activities and enforce a 'no-wireless' zone.
Secure 'no-wireless' zones now possible
16 February, 2015Fluke Networks has released a major upgrade to its AirMagnet Enterprise wireless security solution to immediately identify all rogue wireless activities and enforce a 'no-wireless' zone.
ISASecure cybersecurity certification program expanded
22 July, 2014The ISA Security Compliance Institute (ISCI) has expanded the coverage of the ISASecure cybersecurity certification program with the introduction of a system-level cybersecurity certification and the launch of an organisational certification.
Rockwell launches industrial security initiative
05 September, 2013Rockwell Automation has launched an initiative to help manufacturers better protect their control systems from cybersecurity threats. Automation and IT professionals will be able to more effectively secure their industrial processes with the initiative, which uses control system design and best practices, contemporary technologies and professional services from Rockwell and its strategic partnerships.
Cybersecurity policies that threaten productivity
05 August, 2013 by Mark Elrick*Networks, properly designed for security and fully exploited, can add value to a business, but for many businesses in the Australian manufacturing industries, the fear of internet-borne nasties infecting a network is not uncommon, and may be unnecessarily limiting the productivity gains that current and emerging technologies offer.
Chinese hacker group blamed for Telvent customer file hacking
05 October, 2012Schneider Electric subsidiary Telvent Canada has blamed the recent intrusion to its network on a Chinese group calling themselves the Comment Group or Comment Crew.
Honeywell announces new cybersecurity solution at HUG Symposium
07 August, 2012Honeywell has announced a fully certified application control and whitelisting solution to help combat viruses and malware from attacking its Experion PKS control system platform.
Post-Stuxnet industrial security
17 August, 2011 by Torsten Rössel, Director of Business Development, Innominate Security Technologies AG, GermanyBy now, Stuxnet has become well known as the computer malware worm that allegedly infected Iranian organisations in 2010, most notably those plants alleged to be used for uranium enrichment. But regardless of its original purpose, Stuxnet now proves that insufficient IT security opens automation networks to a clear and present threat.
Matrikon OPC Tunneller
01 August, 2011 byOPC Tunneller from MatrikonOPC now supports encryption and data compression to provide an easy, reliable and secure way to communicate between networked computers. It does away with the difficulties typically associated with DCOM configuration. Different protocols, security settings or locations are no longer a factor when sharing data between computers. This is achieved by installing OPC Tunneller on the OPC client and OPC server nodes and then telling the Tunneller client where the Tunneller server exists.
Effective OPC security for control systems - Part 2
21 July, 2011 by Eric Byres, PEng, ISA Fellow, CTO, Byres Security IncRecent security incidents such as the Stuxnet worm that attacked Siemens WinCC and PCS7 systems in Iran and the remote sabotage of a Texas power utility are a wake-up call for the industrial automation industry. We continue our article from last month with a more in-depth look at the concept of ‘defence in depth’.