Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: on June 10, 2015

“Engineers not specializing in cyber security often throw their hands up at security, it’s not what they do,” says Pat Differ, Director of Sales at Securicon LLC, a consulting firm specializing in cyber security services and solutions for critical infrastructure industries. “The result is they may end up relying heavily on IT-oriented or recommended solutions that are not meant for industrial applications.”

If this bears any resemblance to what is happening in your organization, we have good news for you. Belden has recently teamed up with Securicon to provide one-stop security solutions to our customers.

I recently had the opportunity to speak to Pat and Securicon’s CEO, Paul Hurley, to find out their thoughts on the state of industrial security. Read on to find out their innovative ideas about how to move forward on cyber security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on May 27, 2015

Remember the good old days when the control network stood on its own and no one but engineering could touch it? There were no connections to the enterprise network or the Internet. Cyber security was not an issue!

Well, as you know, those days don’t exist anymore. The stories of reputable organizations falling victim to disastrous cyberattacks are regularly covered in the mainstream press. Attacks on both manufacturers and energy providers are happening all too frequently.

There’s no escaping the push to secure industrial applications. The challenge is how to go about it. In particular, what are the roles of various groups such as IT, operations and top managements in making sure your facility is both protected and ready to act if there is a breach?

To help you with one part of this challenge, let’s take a look at how to communicate with non-technical executives about cyber security. The goal is to make you an effective cyber security leader in your organization.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Industrial IT Team on April 29, 2015

Many North American power utilities have large numbers of isolated electrical substations that operate well but are equipped with legacy devices running on proprietary protocols. Impossible to monitor without someone physically visiting them, such substations prevent utilities from delivering on the promise of the smart grid.

Imagine you run a utility with hundreds of legacy substations that you cannot connect to from a central location. The longer you have this problem the longer your network is going to be out-of-step with an important capability.

Now imagine there is an easy way to connect legacy substations to a central system. “Fantastic,” you think, “What is it?” And “Does it bring with it any new problems? (For example, security issues.) In today’s article, I look at a cost-effective solution for this dilemma that both connects substations to the smart grid and secures them.

Read More >>


Comments (2)
Post a Comment

Blog Category: Industrial Security

Posted by: on April 15, 2015

While IT and controls engineering traditionally have been two widely separate disciplines, the adoption of Ethernet for industrial networking has increasingly brought the two worlds together.

One area that calls for a multi-disciplinary approach is cyber security. Cyber security attacks on critical infrastructure industries have been rapidly growing in number, plus there is heightened concern about it at the executive level.

As result of these trends, our organization is prioritizing investment in cyber security technology and know-how. When it comes to ICS security, we want to provide solutions that meet the requirements of both IT and engineering professionals.

A reflection of this is our recent acquisition of Tripwire. Today, I am going to introduce you to this innovative organization and their role in helping you, our industrial customers and partners, see the big picture of ICS security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on April 01, 2015

The adoption of new technologies in electrical substations has improved communications, but it has also made these networks more vulnerable to cyber threats.

In the past, electrical substation design focused on safety, ease of use and reliability. Security wasn’t a concern. As the substations have grown more complex in their design and threat sources more sophisticated, security has become a priority.

A substation with lax security is more likely to fail or have issues – and these failures can be expensive. So, it’s necessary to have a holistic security policy in place that can help minimize or contain threats – both internal and external, as well as intentional and unintentional.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on March 18, 2015

If you are more comfortable programming PLCs than implementing cyber security measures this series of blogs is for you. Its goal is to give you an overview of the security functions built into network devices so you can implement the ones that are appropriate for your application.

In the first blog, I briefly discussed Defense in Depth and how it is important to implement multiple types of defenses at different points in the control network. This best practice maximizes protection from cyber security incidents, whether they are accidental or intentional.

Part 1 also looked at ways to control access to specific devices, such as industrial Ethernet switches. In today’s blog, we look at ways to control the types of messages any device or computer can send or receive on a network.

Read More >>


Comments (2)
Post a Comment

Blog Category: Industrial Security

Posted by: on March 04, 2015

The results of the 28th annual Control Engineering Engineers’ Choice Awards are out and I am excited to see that one of our flagship products, the Tofino Security Appliance (specifically the Tofino Xenon version), has received an Honorable Mention award.

The award recognizes control and automation products released in 2014 that are exceptional based on technological advancement, service to the industry and market impact. The Tofino Xenon was recognized in the category of Control Security.

Of significance to Belden is that the winners are not chosen by an expert panel, but by automation professionals from Control Engineering’s subscriber lists. These are people like you who have hands-on, day-to-day interaction with the technologies. Also, you all are responsible for and influence technology purchases.

In case you are not familiar with this product, let’s take a look at some of its unique strengths.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on February 18, 2015

Defense in Depth is recognized as one of the key best practices for securing industrial networks. It involves using multiple types of defenses at different layers in the network in order to provide higher resistance to attacks than is possible with a single defense, such as a perimeter firewall.

Your first step should be to do a risk assessment and to prioritize your risks and their countermeasures.

In parallel, think about your current defenses, which likely include the perimeter firewall. Do they also include taking advantage of the security functions built in to other network devices?

Most managed Ethernet switches include cyber security features to protect themselves and they are a way to enhance the security of your network at no extra cost. Today’s blog takes a look at some of the security features built into switches, such as those from our Hirschmann and GarrettCom brands.

Read More >>


Comments (1)
Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed