Safeguarding OT from Cyber Threats

A Solid Defense-in-Depth Program with Added Visibility can Help Provide an Early Warning System in Effort to Defend Against Attacks
Read More.

Readmore Safeguarding OT from Cyber Threats Safeguarding OT from Cyber Threats

IL Nuke Sees Double with Transformer Woes

At the Clinton Power Station, the Old Adage Lives On: Fool Me Once, Shame on You, Fool Me Twice …
Read More.

Readmore IL Nuke Sees Double with Transformer Woes IL Nuke Sees Double with Transformer Woes

NE Nuke: Safety Valves Remained Closed

Nebraska Nuclear Power Plant Operated 89 Days with Key Safety System Impaired EDITOR’S NOTE: This is part of a series
Read More.

Readmore NE Nuke: Safety Valves Remained Closed NE Nuke: Safety Valves Remained Closed

Finding the Competitive Edge

Monitoring Applications Gives Visibility, and can Help Hike Performance in a Very Big Way Not too long ago, ExxonMobil came
Read More.

Readmore Finding the Competitive Edge Finding the Competitive Edge

Going Digital

Smarter, Connected Networks Add Complexity, but Plant Floor Can’t be an Island Anymore
A smart, connected enterprise can
Read More.

Readmore Going Digital Going Digital
By Gary DiFazio
Traditionally, the OT environment is built with a “set it and forget it” mentality. But, once the network is connected to the outside world, that model is no longer optimal. The network becomes dynamic, ever-changing and in constant interaction — most changes are legitimate, some are accidental and some, unfortunately, are nefarious. When it comes to cybersecurity, there is a three-step progression that can help any