Profile cover photo
Profile photo
Anton Shipulin
About
Posts

Post has attachment
A free book by Belden/Hirschmann: “Time-Sensitive Networking For Dummies” - a good option to start learning the topic
https://www.belden.com/resources/knowledge/ebooks/time-sensitive-networking-for-dummies-lp
Photo
Add a comment...

Post has attachment
The United Nations Economic Commission for Europe (UNECE) has confirmed it will integrate ISA/IEC 62443 series of industrial cybersecurity standards into its forthcoming Common Regulatory Framework on Cybersecurity (CRF) - a common legislative basis for cybersecurity practices within the massive EU trade markets
https://www.isa.org/news-and-press-releases/isa-press-releases/2019/january/united-nations-commission-to-integrate-ISA-standards-into-cybersecurity-regulatory-framework/
Photo
Add a comment...

Post has attachment
Nice overview of cybersecurity activities by Siemens and its partners, shows the industrial cybersecurity market trends and players
https://www.controlglobal.com/industrynews/2019/siemens-partners-strive-for-security/
Photo
Add a comment...

Post has attachment
Some interesting stories from the industrial field by the Kaspersky ICS CERT team
https://www.securityweek.com/ics-security-experts-share-interesting-stories
Add a comment...

Post has attachment
The inspiring 20 years story of Digital Bond, S4 - top ICS security conference and Dale Peterson!
https://www.linkedin.com/pulse/20-years-digital-bond-dale-peterson/
Add a comment...

Post has attachment
A talk from CS3STHLM conference, Stockholm, 22–25 October 2018: Attacking PLCs by PLC in deep, Cheng Lei, NSFOCUS. An attack method where a PLC can attack other different vendors’ PLCs (Schneider Electric, Siemens, Rockwell Automation) inside the net
https://www.youtube.com/watch?v=wn0X_dr_t5Y
Add a comment...

Post has attachment
New research: Multilevel Cybersecurity and Safety Monitor for Embedded Cyber-Physical Systems. A flight control system as an example. A multilevel attack monitor comprises of hardware, information, execution monitoring. The hardware resource integrity monitor (HRIM) and the information integrity monitor (I2M) are implemented on FPGA, an execution integrity monitor (EIM) is implemented on a processor.
https://arxiv.org/abs/1812.03377
Photo
Add a comment...

Post has attachment
Honeywell Safety Manager has been recertified by Exida‏ according to the ISASecure EDSA Level 1 security certification. The assessment report has been published
https://www.exida.com/SAEL-Security/honeywell-process-solutions-honeywell-safety-manager
Photo
Add a comment...

Post has attachment

Post has attachment
Add a comment...
Wait while more posts are being loaded