Software & IT > Computer & internet security

Schneider Electric and Claroty partner to address cybersecurity challenges

08 August, 2017

Claroty and Schneider Electric have announced that they are partnering to address safety and cybersecurity challenges in industrial infrastructure.


Phoenix Contact mGuard security appliance firmware v8.4

11 July, 2017

Phoenix Contact has released firmware 8.4 for the mGuard security appliances, extending the functional scope of the devices to include functions such as Modbus/TCP inspection and DNS name-based firewalling.


Honeywell to open cybersecurity centre in Singapore

09 June, 2017

Honeywell Process Solutions (HPS), with the support of the Singapore Economic Development Board (EDB), will establish a new industrial cybersecurity centre of excellence (COE) for Asia Pacific in Singapore.


Protecting operations in the energy sector against cyber attacks

06 June, 2017

The development of the digital oilfield promises new and more efficient ways of doing business for oil and gas companies, but at the same time exposes them to serious risk of cyber attack.


Honeywell launches solution to secure USB devices in plants

11 April, 2017

Honeywell's Secure Media Exchange (SMX) is claimed to protect facilities against current and emerging USB-borne threats, without the need for complex procedures or restrictions that impact operations or industrial personnel.


MatrikonOPC DMZ Agent

19 October, 2016

MatrikonOPC DMZ Agent provides a secure, standardised solution for accessing real-time and archived control automation data across DMZs using off-the-shelf MatrikonOPC products.


Schneider Electric launches Australian industrial cybersecurity practice

20 September, 2016

Schneider Electric has launched an industrial cybersecurity practice in Australia to improve protection for utility, resources and manufacturing industries from attack.


Intel Security threat report reveals that manufacturing sector is least prepared to prevent information theft

16 September, 2016

Intel Security's latest McAfee Labs Threat Report, September 2016 has revealed that the healthcare and manufacturing sectors are among the least prepared to prevent information theft, while retail and financial services have the greatest cybersecurity protections in place to deal with data loss.


ADFA expert predicts China will gain cyber dominance over Taiwan by 2030

30 June, 2016

It may seem odd to publish this news item on an industrial automation website, but critical infrastructure organisations and companies associated with the Australian defence industry need to take heed.


How are IT teams preparing for the rise of intelligent machines?

15 June, 2016

Research commissioned by software vendor Ipswitch has highlighted rapid adoption of intelligent machines used for automating and optimising business and IT processes.


State-sponsored hackers threaten industry, infrastructure, says Honeywell

08 June, 2016

Honeywell says that hackers are increasingly targeting industrial facilities, from oil refineries to nuclear power plants, with sophisticated attacks aimed at capturing data and remotely controlling the sites.


Australia's cybercrime problem: agenda for the next government

30 May, 2016

A new discussion paper released by the ACCS notes a substantial spending gap between measures recently announced by the federal government and comparable spending commitments made by its allies for cybersecurity in the past half year.


The control system kill chain: understanding external ICS cyber threats — Part 2

06 May, 2016 by Glenn Johnson, Editor

Greater connectivity between industrial control systems, business IT systems and the internet promises to provide great advances in industrial efficiency — but comes with greater cybersecurity risk.


Cybersecurity needs focus in a connected world

15 April, 2016 by Bradley Yager, Director Process Automation Offer Management and Business Development Pacific, Schneider Electric

With increased connectivity comes increased risk. Most of us are aware of a need for some level of IT cybersecurity, but now, more than ever, the challenge lies in protecting the OT (operational technology) layer.


The control system kill chain: understanding external ICS cyber threats — Part 1

11 April, 2016 by Glenn Johnson, Editor

Understanding the approach a sophisticated external cyber attack adversary may take in infiltrating an industrial control system helps organisations defend against the unthinkable.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd