This is a continuation of last month’s column on cybersecurity, but with a very specific target. When I interviewed experts in the field, I was specifically looking for feedback on protecting critical infrastructure installations with respect to remote access only. Standard IT solutions and/or issues were not considered. The real question was how we protect these assets when remote access is needed and/or required. It is obvious that IIoT is going to create a bastion of security issues according to Joe Weiss, an international cybersecurity expert who writes the Unfettered blog. Weiss has been involved with industrial security issues for a very long time, and he…Full Story
Ladder diagram is all that is needed for typical machine control applications. Do yourself a favor and use it.