WaterWorld Webinar to Feature Seamless Migration to Open Secure Automation
Bedrock Automation Industry News
by Robert Bergman
1y ago
Boston, Mass. – August  25, 2021 – Bedrock Automation has announced that Bedrock Premier System Integrator partner Russ Ropken of RSI Company will describe how he is helping transition the legacy PLCs at East Cherry Creek Valley Water and Sanitation district to modern cybersecure Bedrock OSA technology, without interrupting operations in an upcoming WaterWorld webinar. RSI Company has almost 30 years of experience in delivering automation solutions to the water/wastewater industry. Bedrock IEC-61131 programming, systems integration, and training are among its specialties. Ropken will shar ..read more
Visit website
Accelerating Digital Energy Podcast
Bedrock Automation Industry News
by Robert Bergman
1y ago
Accelerating Digital Energy The post Accelerating Digital Energy Podcast first appeared on Bedrock Automation ..read more
Visit website
Automation Nation
Bedrock Automation Industry News
by Kate Pinckney
1y ago
..read more
Visit website
Secure control nodes enable connectivity Control magazine includes Bedrock OSA Remote in IIoT/digitalization technology round-up.
Bedrock Automation Industry News
by Kate Pinckney
1y ago
..read more
Visit website
Automation Nation
Bedrock Automation Industry News
by Kate Pinckney
1y ago
..read more
Visit website
Securing Pipeline Flow Measurement and Metering
Bedrock Automation Industry News
by Kate Pinckney
1y ago
..read more
Visit website
OSA Today: Insecurity by Design?
Bedrock Automation Industry News
by Kate Pinckney
1y ago
  Bringing you insights and news on how open secure automation is enabling digital transformation and revolutionary cost control Is Compliance with Security Standards Enough?:  A recent report on the status of intrinsic cyber security found that serious vulnerabilities still exist in the products of many of the largest control systems vendors even though many are sold as ‘secure by design’ or have been certified with OT security standards. TSA Relaxing Pipeline Cyber Security Directive: Responding to industry pushback, the TSA is relaxing the stringent cybersecurity reporting and m ..read more
Visit website
ICS in the Army
Bedrock Automation Industry News
by Robert Bergman
1y ago
When most people think of industrial control system users, the Army may not be the first thing that comes to mind, but the U.S. Army depends heavily on industrial control systems for managing critical power plants, dams and water supplies, as well as combat related operations. Adam Stone explores military ICS applications in a recent FedTech feature. He said that the control technology that the military uses is just as vulnerable to cyberattack as that run by states and the private sector, and that the federal government is moving ahead to cyber-harden critical infrastructure by applying more ..read more
Visit website
TSA Relaxing Pipeline Cyber Security Directive
Bedrock Automation Industry News
by Robert Bergman
1y ago
The Transportation Safety Administration (TSA) is relaxing the cyber security restrictions that it placed on the pipeline industry immediately after the Colonial Pipeline attack. Where the May 27, 2021 directive required pipeline operators to report breaches within 12 hours; the new directive issued on May 29, 2022 allows 24 hours. The greatest point of contention with last year’s directive, however, was the requirement for pipeline operators to review and fill gaps between their current cyber security practices and the TSA’s 33-page cyber security guidelines as updated in April of 2021, most ..read more
Visit website
Is Compliance with Security Standards Enough?
Bedrock Automation Industry News
by Robert Bergman
1y ago
Verdere Labs, the cyber security research arm of Forescout Technologies, analyzed control products of 10 of the largest control system providers and identified 56 cyber security vulnerabilities. They said that hackers exploiting these vulnerabilities could gain network access to a target device on which they could remotely execute code, change the logic, files or firmware of OT devices, bypass authentication, compromise credentials, cause denials of service or have a variety of operational impacts. The researchers were especially concerned that the vulnerabilities were in products often deploy ..read more
Visit website

Follow Bedrock Automation Industry News on FeedSpot

Continue with Google
Continue with Apple
OR