Articles & Presentations

Articles & Presentations

Industrial Networks Under Attack

Article from: Security Technology Executive Magazine, January/February 2013

This article provides an overview of the state of SCADA and ICS security and outlines how a combination of best practices, technology designed for the plant floor and focused efforts will significantly improve a facility’s cyber security posture.

Security: How IT and Industrial Control Differ

Article from: Automation World, January 23, 2013

 

In this article David Greenfield discusses the differences between IT and industrial control system security.

 

Defense in Depth

Article from: InTech, November/December 2012

The past two years have been a real wake-up call for the industrial automation industry. For the first time ever, it has been the target of sophisticated cyber-attacks like Stuxnet, Night Dragon, and Duqu.

Eric Byres; "Defense in Depth: A single cyber defense is the weakest form of cyber protection", InTech, November/December 2012

SCADA Security Basics: Why are PLCs so Insecure?

Article from: Automation and Control Technical, October 2012

Recently Eric Byres addressed the difference between SCADA, ICS and other jargon in our industry. In this article Erik Schweigert addresses a question he is often asked “Why are industrial networks so hard to secure?” This is a big topic, so for now he simply addresses “Why are PLCs so insecure?”

Debate: Flame, Stuxnet and other APTs are hype, but still be wary

Article from: SC Magazine, October 2012

In this article Eric Byres promotes his belief that Advanced Persistent Threats are not all hype and that we are entering a new era where industry is a main target in the the growing world of malware.

Process Automation Systems: How Secure Is Secure Enough?

Article from: Control Global, October 2012

In this article, Walt Boyes discusses where to draw the line when applying security to your industrial control system. He begins by looking at the evolution of security in ICS and how to move forward in a practical and realistic manner.

SCADA Security Issues – A Virtual Panel Discussion

Article from: EngineerIT, September 2012

EngineerIT invited a group of experts representing a number of companies to contribute to a virtual panel discussion on security issues in supervisory control and data acquisition (SCADA) systems, including a debate around the Air Gap principle.

Tofino solutions for industrial data security

Article from: SA Instrumentation & Control, September 2012

In this article, Extech Safety Systems discusses how preventing the spread of Stuxnet over control networks is key to maintaining safe, reliable and secure industrial systems. The Tofino Industrial Security Solution can mitigate many of the effects of the Stuxnet virus, while also protecting industrial networks against many other methods of accidental or malicious attack.

Securing critical industrial processes in real-time

Article from: SA Instrumentation & Control, September 2012

In this article, Extech Safety Systems discusses the susceptibility of critical SCADA systems to security issues. The solution is an architecture called Scadanet that provides a simple and secure encryption system between control devices.

New Strategies, Tools Keep Network Neighborhoods Cool

Article from: Control Design, August 2012

In this article, Jim Montague, Executive Editor of Control, Control Design and Industrial Networking discusses how the Tofino Industrial Security Solution was implemented by system integrator Cimation on a high volume fixed oil platform. Read about the challenges Cimation faced and how Tofino helped the network design to follow IEC/ISA-62443 security standards.

Jim Montague; "New Strategies, Tools Keep Network Neighborhoods Cool ", Control Design, August 2012

Securing SCADA and Process Systems from Advanced Persistent Threats

Article from: Oil & Gas Monitor, July 2012

In this article, Eric Byres discusses the complex computer worm called Flame and how it is a great example of an Advanced Persistent Threat (APT). This article focuses on explaining what APTs are and what they mean for companies in the oil and gas sector.

Network Security Matures

Article from: AutomationWorld, May 2012

Terry Costlow, Contributing Editor to AutomationWorld magazine illustrates how system integrators at Cimation set up the network on a high volume platform and in doing so, included security to minimize downtime caused by accidental or malicious forces.  Read how the Tofino Industrial Security Solution was implemented to create defense in depth for the platform

Terry Costlow; "Network Security Matures ", AutomationWorld, May 2012

#1 ICS and SCADA Security Myth: Protection by Air Gap

Article from: IT & Production Magazine, March 2012

In this article Eric Byres discusses the myth that an air gap between the control network and the buisness network provides security.

Read about why Eric thinks this concept is a "fairy tale"

#1 ICS and SCADA Security Myth: Protection by Air Gap (Newsletter)

Article from: ICSJWG Quarterly Newsletter, March 2012

In his contributing article to the ICSJWG Quarterly Newsletter (pg. 5) Eric Byres discusses the myth that an air gap between the control network and the buisness network provides security.

Read about why Eric thinks this concept is a "fairy tale"

Using ANSI/ISA-99 standards to improve control system security

Article from: Industrial Ethernet Book, February 2012

Today, operators are being asked to isolate automation systems just as ever greater interconnectedness is demanded. Adding to these pressures is the growing fear of cyber attacks such as the infamous Stuxnet.

In this article Eric Byres explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for dealing with network security concerns, including fears of the " Son-of-Stuxnet".

Cyber Espionage comes to SCADA Security

Article from: Automation.com, February 2012

SCADA and Industrial Control Systems operators have been under pressure to increase productivity and reduce costs through network integration.  In addition, proprietary network technologies are being replaced with commercial-off-the-shelf technologies.

At the same time, advanced persistent threats such as Stuxnet, Night Dragon, Duqu and Nitro have made industrial systems their targets.

Pages

Subscribe to RSS - Articles & Presentations