Solar generation has been around for a very long time. However, until recently, it always made up a very small percentage of global power generation. As a result, solar generation was never really considered critical infrastructure. Today, however, that dynamic is...
Cybersecurity
Why Cybersecurity Looks Different in Life Sciences
We talk a lot about cybersecurity in the OT space. Cybersecurity has always posed a unique challenge for OT technologies, for a number of reasons. Often, OT teams are dealing with legacy technology that was never designed to be cybersecure and doesn’t operate in a...
Network Security Monitoring and NERC CIP
Emerson’s Nick Janouskovec presented NERC CIP-015-1 Internal Network Security Monitoring and Power and Water Cyber Security Network Security Monitoring at the 2025 Ovation Users’ Group Conference.
Dragos and Nozomi Network Security Monitoring
At the 2025 Ovation Users’ Group Conference, Emerson’s Thomas Kizer and Alejandro Cruz presented Network Security Monitoring Features and Functions Comparison: Dragos and Nozomi.
What Type of Cyber Defender Is Your OT Team?
We’ve talked a lot in this space about how cybersecurity is a particularly difficult challenge for OT teams. For decades, OT systems were specifically engineered to be closed to the outside world and from one another to ensure secure, reliable operation. That trend...
Stronger Together: Why Power Industry Cybersecurity Starts with Collaboration
One of the greatest challenges around the world is convincing people (or companies, for that matter) to make changes they don’t want to invest in. Regardless of the state of the marketplace, change that comes with added costs is always a difficult sell. And if that...
Protecting Critical Facilities from Cyber Attacks
A recent Forbes article,7 Steps Utilities Must Take To Protect Critical Facilities From Cyber Attacks highlights focus areas for manufacturers and producers to strengthen their operational resilience.
Upgrade or Get Left Behind: The Hidden Risks of Old Wireless Field Gateways
In a world where field operations depend on fast, reliable, and secure data transmission, sticking with outdated wireless field gateways can silently sabotage your performance. Legacy devices will still in operation, but they're often the weak point — exposing systems...
Unraveling the Cybersecurity Knot: How OT Teams Can Leverage Automation Experts
It has become increasingly obvious that the need for strong cybersecurity is not going to go away. Operational technology (OT) assets have increasingly become targets of both large-scale and small-scale attacks, often with devastating effects. OT teams need to be...
Industrial Cybersecurity Navigates a New Normal
Cybersecurity is a critical concern for industrial manufacturers these days, particularly as high-profile incidents targeting plants have become the new normal. No organization wants to risk the production loss, safety concerns, and reputation damage that come with a...
Digital Tools Keep the Lights On
Because power plants provide critical infrastructure, they are often subject to more scrutiny than other facilities. First and foremost, power plants are less able to tolerate unanticipated outages and service delays because they can mean failure to deliver the...
Cybersecurity Strategies for the Rise of Next-Gen Automation
Today’s most successful organizations are facing a wide variety of new challenges: a need for increased flexibility, a push toward more sustainable operations, a shrinking experienced workforce, and more. Meeting those challenges will require unlocking the next...
Keep Up to Date With the Latest News and Updates
Follow Us
We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.
Do you want to reuse or translate content?
Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.
Our Global Community
Emerson Exchange 365
The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.