OT-Connect News
Press releases
-
Industrial Cybersecurity RoadShow 2021
We have created a virtual Road-Show for Industrial Cybersecurity and Critical Infrastructures, through which we will present weekly relevant information, highlighted +
-
New Program of Partners and Systems Integrators
We create a Program of the highest level, Simple, Reliable and Profitable! Together with our Partners and Certified Integrators we build the +
-
Manage, Evaluate and Implement ISA / IEC-62443 Like an Expert
The new training courses 2150, 2160, 2161, and 2162 are dedicated exclusively and primarily to the implementation and +
-
We have started a reengineering of the WisePlant Group
Last June 2020, motivated and driven by the circumstances that continue to affect the entire world, the +
-
COVID-19: Action Plan with Responsibility
To our employees, customers, shareholders and the public we serve. In light of developments related to COVID-19, +
-
ISA Global Cybersecurity Alliance announces 23 organizations as new Founding members
January 16, 2020: ISA Global Cybersecurity Alliance begins the new year with several priority projects underway and +
ZCM - Zones & Conduits Manager
-
Manage, Evaluate and Implement ISA / IEC-62443 Like an Expert
The new training courses 2150, 2160, 2161, and 2162 are dedicated exclusively and primarily to implementation and compliance, with the ZCM system developed by WisePlant Group LLC. Users are ready to begin implementation and +
-
Certified Independent Consultants in Industrial Cybersecurity
Database of independent consultants certified in industrial cybersecurity to collaborate on projects of our clients and certified system integrators. +
-
Industrial Cyber Risk Assessment to make decisions
The methodology for evaluating industrial cyber risks has received many debates since the topic began to be discussed. However, it is highly relevant for manufacturers to adopt the correct methodology. There are those who have a lot of experience in +
-
Insufficient Cybersecurity Approach!
Addressing the solution to Cybersecurity with the traditional IT proposal of information security is insufficient for control systems, and is far from satisfying the needs of industrial plants, and much further from +
-
How to correctly define zones and conduits?
Usually we see how many professionals have a wrong concept regarding Zones and Conduits, the way in which they must be defined and the implications from the point of view of industrial cyber security. +
-
Meet all the requirements of the Assessment phase of ISA / IEC-62443 without additional tools
Zones & Conduits Manager is a solution designed and thought from scratch to satisfy all the requirements of the ISA / IEC-62443 series of standards, with the addition of other regulations, such as, NIST, NERC, C2M2, and many others. The system +
Incidents, consequences and impacts
-
Explosion at Playa de Tanques injures 7 workers in USA
-
Hackkers Access Unsafe HMI at Israeli Water Facility
-
Two dead and more than XNUMX rescued after an offshore support vessel collided with the platform
-
Texas chemical company and executives acquitted of charges stemming from the 2017 Hurricane Harvey incident
Industrial Cyber Security in the world
-
Future Series: Cybersecurity, Emerging Technology, and Systemic Risk
Unless action is taken now, by 2025 next-generation technology, on which the world will increasingly depend, has the potential to overwhelm the defenses of the global security community. Enhanced cybersecurity is the only means by which this challenge can be addressed, but the approach to cybersecurity must be reviewed before the industry is in a suitable state to face the threat. +
-
Two sides of the same coin
A weakness in security creates increased risk, which in turn creates decreased security, so security and protection are directly proportional, but both are inversely proportional to risk. +
-
We need a global standard to report cyber attacks
Cyber threats are a seemingly impossible challenge. By their very nature, rapidly changing, borderless, asymmetrical, they are ridiculously difficult to predict and manage. No wonder the World Economic Forum has once again placed cybersecurity +
-
The creator of TOR explains how to surf the Web safely and anonymously (protect your information)
Browsing the Web safely and anonymously is a privilege that currently requires some knowledge and skill on the part of users. If you use a browser to view a web page, no matter how much this +
-
Cyber insurance for critical infrastructure and debate on war
For those concerned about cybersecurity and critical infrastructure, there is nothing more terrifying than the possibility of a successful cyber attack on a dam or power plant. The after-effects of such an attack could have potentially catastrophic consequences including, +
Threats and Vulnerabilities
Training and Certification
-
Education and Training with ISA
ISA is committed to providing a learning environment free from discrimination and harassment based on a person's race, color, creed, religion, national origin, age, gender, disability, sexual orientation, or veteran status. Unlawful discrimination or harassment (sexual or otherwise) or bullying in the learning environment in any form will not be tolerated by ISA. +
-
Our new v4 Educational Campus is ready!
After several months of work, the new Campus WiseCourses has finally been migrated from the old system. The new Campus brings much easier and more pleasant tools that we are sure you will love. +
-
Explanatory webinar on the course of identification and evaluation of industrial cyber risks in zones and pipes (2160)
Your browser does not support JavaScript! JavaScript is needed to display this video player! +
Industrial Applications and Solutions
-
Separation of process control systems and instrumented security
Process security: Keeping control of process and security systems separate is crucial, but knowing what to separate and integrate and why is critical. Learn about Security Instrumented Function (SIF) and Protection Analysis Layers (LOPA). +
-
Cyber security in the digital oil field
Oil producers have heard about the promise of the digital oil field for more than 20 years. Now, just when it seemed like it was about to emerge, a problem arose: making the most of digital connectivity requires technology based +
-
Improved efficiency of countercurrent decant thickeners (CCD) in gold and copper mining processes
Application problem The customer of a large gold / copper mining company wanted to improve automation control of their five-thickener CCD circuit. The problem was the inconsistency of the flocculation chemical to the CCD circuit that +
-
Cement powder level: the powerful self-cleaning sound wave sensor Sultan of HAWK
The Problem Overview: An acoustic wave level sensor is used to monitor the level of cement dust in a storage container or silo. Each silo contains cement of particular type specifications. One or more silos +
-
Reliable detection of blocked channels without contact
Magnetite Iron Ore Mine - WA Existing Situation A competing microwave-blocked gutter sensor was mounting high in a transfer chute and could not function reliably. The physical switch +
Open and Secure Automation
-
Hawk Measurement acquires SIL2 / SIL3 certification for its Centurion guided radar
Hawk Measurement Systems (HAWK), a world leader in measurement solutions, has announced that it has obtained the SIL2 / SIL3 Safety Integrity Level rating to help reduce safety risks in hazardous applications from the International Electrotechnical Commission. The IEC 61508 standard of this Commission (IEC) defines SIL using requirements grouped into two broad categories: hardware safety integrity and systematic safety integrity. A device or system must meet the requirements of both categories to achieve a given SIL. Achieving this SIL certification means that HAWK's Centurion guided radar measurement systems will provide operators with the added assurance that it will consistently and reliably identify all processes deemed hazardous and, if +
-
Bedrock Automation announces the launch of a new SECURE REMOTE
-
Speaking of Innovation… Redefined Energy Systems
Did you know that the open and secure automation platform (BEDROCK OSA ™) is backed by the most advanced power solutions in the industry today? Secure SPS and UPS solutions offer on-board diagnostics and +
-
Circular Polarization in Microwave process measurement
Circular polarization is used in a large number of specialties such as optics and telecommunications. In our case, Hawk Measurement uses the circular polarization technique to measure industrial microwave processes. Linear Polarization: in +
-
The HiMax Security Instrumented System receives the ISA Secure® Certification
HIMA's HiMax functional security system receives the ISASecure® certificate by TÜV Rheinland in compliance with strict cybersecurity standards Advanced Cyber Security: HIMA's HiMax security controller has received the new cyber security certificate from +