A tragic explosion on a sewage boat in New York City results in one death, sparking investigations and safety discussions.
Explosion at diesel processing facility injures worker in mexico facility
An explosion at a diesel processing facility in Mexico injures a worker, prompting an urgent investigation and safety review.
Analyzing the Cybersecurity Risk Formula to Calculate Risk
This article delves into the intricacies of calculating cybersecurity risk, emphasizing the formula: Risk = Threat x Vulnerability x Impact. It explores various methods used in industrial cybersecurity, including statistical, vulnerability-based, and consequence-based approaches. The discussion highlights the importance of aligning risk assessment with the ISA/IEC-62443 standards to ensure long-term, sustainable security solutions for industrial environments.
Chemical plant fire in Spain sends several towns into lockdown
Discover the aftermath of a chemical plant fire in Spain, as several towns go into lockdown. Emergency response efforts intensify to contain the blazing inferno’s effects, with public safety measures in place.
A practical approach to Process safety (PS) Courses: New training program at WiseCourses
Functional safety is crucial in industries such as oil, gas, energy, chemical, petroleum, and petrochemical, where failures can lead to significant harm to people, property, and the environment.
The Flixborough disaster
Explore the profound impact of the Flixborough disaster on safety regulations, industry practices, and the enduring lessons learned.
Analyzing the cybersecurity TRIAD for industrial applications as no one has explained it to you. The harsh reality.
The Cybersecurity TRIAD is insuficiente into Industrial Control Systems. The wrong application of rationales will lead to budget mitigation instead of a realistic and practical mitigation of risk. The industry is being cheated and robbed with wrong solutions.
Spain’s grid collapsed in 5 seconds. What Caused Spain and Portugal’s Massive Power Outage?
In just 5 seconds, Spain’s grid collapsed, triggering a massive power outage. Explore the causes, vulnerabilities, and recovery efforts.
Fire on Petrobras offshore platform seriously injures 14
WisePlant explores the aftermath of a serious fire incident on a Petrobras offshore platform, delving into injuries, emergency response, investigation, safety measures, and lessons learned.
Unified Model for Monitoring & Alarm Management: Integrating ISA18.2 and ISA/IEC-62443 Standards
Explore the synergy between ISA18.2 and ISA/IEC-62443 standards in urban environments. Learn how plants combat climate change.
Hackers use Windows RID hijacking to create hidden admin account
Learn how hackers exploit Windows RID hijacking to create hidden admin accounts, posing serious security threats. Understand the dangers and take action to counter these stealth attacks effectively. Keep yourself informed and safeguard against potential intrusions.
Ransomware gang uses SSH tunnels for stealthy VMware ESXi access
Discover how cybercriminals leverage SSH tunnels to discreetly breach VMware ESXi servers. Experts raise alarms on growing covert access threats amid ransomware operations. Dive into the study shedding light on virtualization security risks.
Datasheet: WBS – System under Consideration (SuC)
ISA/IEC-62443 Applications Compliance
The ISA/IEC-62443 series of standards is developed on three main roles. These are (a) plant owner, (b) value-added service provider, and (c) component and system manufacturers. Each with different responsibilities, concerns, priorities and objectives.
Taking good decisions during a risk assessment
Many different methods are currently used to assess cyber risk in industrial systems. Only a few are a good decisions.
RMS – Risk Assessment Package
Streamline your industrial risk assessment process with WisePlant’s RMS Risk Assessment Package. Apply ISA/IEC-62443 methodologies to identify threats, evaluate consequences, and enhance cybersecurity and functional safety across control systems.
Security By Design in Industrial Cybersecurity
Security by design is one of the most important and fundamental activities during the process of implementing cybersecurity in industrial systems.
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched
Security experts express alarm as unpatched Fortinet VPN zero-day continues to fuel malicious attacks. Concerns grow over unresolved vulnerabilities posing a critical security threat. Hackers exploit flaws despite ongoing alerts to users, highlighting persistent risks in today’s cybersecurity landscape.
1. What is industrial Cybersecurity?
Learn about the importance of securing industrial networks and the challenges in implementing effective cybersecurity measures within industrial environments.
The WiseCourses Black Friday Week is Active!
Don’t miss our amazing Black Friday Week sale deals on events, training, and the WiseCourses Academy. Visit our site and add this event to your calendar!