In recent weeks, there have been third party reports regarding security vulnerabilities of WirelessHART® systems. Emerson's security experts have investigated and evaluated these claims. There are no known instances of successful security breaches in a customer...
cybersecurity
Secure Out of the Box Myth-Part 2
In Secure Out of the Box Myth-Part 1 we highlighted some of the challenges and misconceptions around effective cybersecurity efforts. Part 1 explored the myths that a system can be made secure without ongoing actions by the end user in collaboration with their...
Secure Out of the Box Myth-Part 1
Last month, a full day was devoted to the issues and practices around cybersecurity at the AFPM (American Fuel & Petrochemical Manufacturers) 2015 Q&A and Technology Forum. Emerson's Neil Peterson was one of the presenters. His presentation, The Myth of...
Emerson Secure Remote Access Strengthens Security for Customers Remotely Accessing their Control Systems
Author: Rick Gorskie, Asset Strategy & Management Program Manager While the DeltaV distributed control system (DCS) has long incorporated firewalls and network switches that provide easy-to-configure security and protection features, users have traditionally used...
Protecting Control Systems with Comprehensive Cybersecurity Programs
Author: Jocelyn Sexton At this year's Offshore Technology Conference, Asset Strategy & Management Program Manager Rick Gorskie talked to oil and gas customers about their concerns regarding cybersecurity. As you can imagine, it's a hot topic. Many of our customers...
Cyber-Security in Metals and Mining
Author: Juan Carlos Bravo In the past, we discussed how the metals and mining industry was increasingly becoming a target for cyber-attacks. An Ernst and Young report, Business risks facing mining and metals 2015–2016 recently upgraded cybersecurity into its top 10...
Different Approaches for Managing DCSs and Enterprise Systems
Author: Dennis Tkacs Why do computer driven systems fail? It's a subject I want to develop over the next few blog posts. And by fail I don't mean technically, but rather why do they fail to meet the business cases under which their procurement was initially justified?...
Reliability Advancements over a Generation
The editors of Maintenance Technology magazine asked me to write a column on technology advancements to improve reliability for process manufacturers and producers. I was excited to be asked and given the opportunity to share some thoughts! The article, Viewpoint:...
Critical Infrastructure and Cybersecurity
Author: Dennis Tkacs Not a day goes by without mention of a new cybersecurity incident, the hack of a prominent organization's website, a new security threat, or an attack that compromises consumer financial information. US based retailers Target and Home Depot are...
Cybersecurity for Water Utilities
One only has to do a Google News search on cybersecurity to know it is a key concern for businesses across the globe. In a Water Online article, SCADA Cybersecurity: What Every Water Utility Should Do Now To Prevent An Attack, Emerson's Doug Johnson shares areas of...
Control System Connections to the Internet
Cybersecurity remains a top concern among process manufacturers around the globe. In a recent Process Engineering article, Weak spot, the article opens: Last month marked the end of technical support for Microsoft's Windows XP operating system. Robert Smith...
Miners and the Need to be Mindful of Cyber-Security
Author: Juan Carlos Bravo This week, we heard in the news how the "Heart bleed" virus exposed sensitive information from millions of users and multinational companies across many industries. So this poses the question—how many miners are exposed to cyber-attacks. Very...
Keep Up to Date With the Latest News and Updates
Follow Us
We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.
Do you want to reuse or translate content?
Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.
Our Global Community
Emerson Exchange 365
The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.