We’ve talked a lot in this space about how cybersecurity is a particularly difficult challenge for OT teams. For decades, OT systems were specifically engineered to be closed to the outside world and from one another to ensure secure, reliable operation. That trend...
Cybersecurity
Stronger Together: Why Power Industry Cybersecurity Starts with Collaboration
One of the greatest challenges around the world is convincing people (or companies, for that matter) to make changes they don’t want to invest in. Regardless of the state of the marketplace, change that comes with added costs is always a difficult sell. And if that...
Protecting Critical Facilities from Cyber Attacks
A recent Forbes article,7 Steps Utilities Must Take To Protect Critical Facilities From Cyber Attacks highlights focus areas for manufacturers and producers to strengthen their operational resilience.
Upgrade or Get Left Behind: The Hidden Risks of Old Wireless Field Gateways
In a world where field operations depend on fast, reliable, and secure data transmission, sticking with outdated wireless field gateways can silently sabotage your performance. Legacy devices will still in operation, but they're often the weak point — exposing systems...
Unraveling the Cybersecurity Knot: How OT Teams Can Leverage Automation Experts
It has become increasingly obvious that the need for strong cybersecurity is not going to go away. Operational technology (OT) assets have increasingly become targets of both large-scale and small-scale attacks, often with devastating effects. OT teams need to be...
Industrial Cybersecurity Navigates a New Normal
Cybersecurity is a critical concern for industrial manufacturers these days, particularly as high-profile incidents targeting plants have become the new normal. No organization wants to risk the production loss, safety concerns, and reputation damage that come with a...
Digital Tools Keep the Lights On
Because power plants provide critical infrastructure, they are often subject to more scrutiny than other facilities. First and foremost, power plants are less able to tolerate unanticipated outages and service delays because they can mean failure to deliver the...
Cybersecurity Strategies for the Rise of Next-Gen Automation
Today’s most successful organizations are facing a wide variety of new challenges: a need for increased flexibility, a push toward more sustainable operations, a shrinking experienced workforce, and more. Meeting those challenges will require unlocking the next...
Security for Cloud-Based Applications
Alejandro Cruz and Nick Janouskovec presented Cloud & Security for Cloud Environments at the 2024 Ovation Users Group conference and shared cybersecurity standards and guidelines for electrical power generation companies.
True Cybersecurity Relies on Quality Engineering
One of the key highlights of Emerson’s Ovation Users’ Group is the wealth of outside perspectives users are exposed to across the week in Pittsburgh. Tuesday morning’s Cyber-Informed Engineering session was no exception. Virginia Wright, program manager for the...
Improving Cybersecurity in the Water Industry
At the 2024 Ovation Users Conference, Emerson’s Alejandro Cruz presented Power & Water Cybersecurity Suite (PWCS)—Mapping to the NIST & CISA Cyber Action Recommendations.
Building Cybersecurity Robustness in Pipeline Operations Podcast
Emerson cybersecurity expert Steve Hill joins podcast host Jim Cahill to discuss these additional challenges and ways the companies in these industries, suppliers, and federal regulators are collaborating to develop and implement best practices for strong cyber resiliency.
Keep Up to Date With the Latest News and Updates
Follow Us
We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.
Do you want to reuse or translate content?
Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.
Our Global Community
Emerson Exchange 365
The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.