How to Effectively Implement ISA 99 / IEC 62443

For control systems utilizing password-based authentication, the control system shall provide the capability to enforce configurable password strength based on minimum length and variety of character types. Additionally, control systems shall prevent password reuse for a configurable number of generations and enforce minimum and maximum password lifetime restrictions.

Loading

Dynamic Network Segmentation

The IT landscape is rapidly evolving to meet the demands of our digitally transforming world and a radically changed business environment that calls for always-on performance and agility at scale. As a result, client-server computing has given way to disruptive IT architectures that reshape business and ownership models. These include Read more…

Loading

The Benefits of Network Monitoring for Industrial Digitalization

Today, manufacturing is powered by thousands of connected devices, massive computing power and artificial intelligence. These advances enable manufacturers to adopt flexible, built-to-order production methodologies that include automated  workflows and real-time performance monitoring. Together they improve efficiency, reduce errors and cut costs, but with these benefits comes increased cyber risk.

Loading

WordPress Double Opt-in by Forge12