Submitted by Heather MacKenzie on Tue, 2013-06-04 09:05
Improving the cyber security of industrial networks is a challenge you may be facing.
On the one hand your manufacturing processes probably use devices such as PLCs (programmable logic controllers) and DCS (distributed control systems) that were designed with a focus on reliability and safety rather than security. On the other hand your industrial networks are already, or soon will be, connected to your company’s enterprise networks and migrated to Ethernet.
Submitted by oliver.kleineberg on Wed, 2012-05-23 21:00
Note from Eric Byres: Oliver Kleineberg makes his debut today as a blogger for Practical SCADA Security and we welcome his expertise in the areas of fault tolerance and redundant networking. He has recently joined Tofino Security from Hirschmann, our sister company, based in Germany (and both of our groups are part of Belden).
Submitted by Eric Byres on Wed, 2011-11-30 10:32
I just returned from the massive SPS IPC Drives show in Nuremburg, Germany. This is a massive show - according to the SPS web site, there were 56,321 visitors! An industrial automation show of this size is something I haven’t seen in North America since the glory days of ISA in the 1980s. If you want to see the trends and new technologies in the automation world, this is a good place to start.
Submitted by rahulsebos on Tue, 2011-01-04 13:55
In the post-Stuxnet cyber security world, many vendors are actively thinking about protective measures that could prevent a similar attack on industrial systems.
Such measures could be implemented at the PC-level, the PLC-level, or even the Profibus or device-level. They could include methods such as antivirus-scanners, firewalls, patch management, password policies, USB usage policies, code integrity checkers, etc. However, all of these measures are ones that are implemented at the highest levels of an industrial system.