Articles & News on ISA Global Cybersecurity Alliance

AI and Machine Learning in Automation: The Security Imperative
- by Vaibhav Malik
- July 30, 2024
- Feature
Let's explore the impact of AI and ML on control systems and automation, with a specific focus on the critical importance of security in this evolving landscape.

Importance and Challenges of OT Patching in Line with ISA/IEC 62443-2-3
- by Muhammad Musbah
- July 17, 2024
- Feature
In the realm of Industrial Automation and Control Systems (IACS), effective patch management is critical, and it is governed by ISA/IEC 62443-2-3.

ISA White Paper on IIoT Systems Addresses Unique Cybersecurity Needs of Cloud and Edge-Cloud Services
- July 9, 2024
- News
The International Society of Automation (ISA) has announced that its ISASecure cybersecurity certification program and the ISA Global Cybersecurity Alliance have released a new paper on industrial internet of things (IIoT) systems.

Equipping Students and Educators with Industrial Cybersecurity Knowledge
- by Sean McBride
- July 3, 2024
- Feature
The ISA Global Cybersecurity Alliance has released the Curricular Guidance: Industrial Cybersecurity Knowledge document.

How to Implement Adaptive Security in Your Organization
- by Zac Amos
- July 2, 2024
- Feature
Whereas conventional methods build their protections around responding to incidents—internal or in other organizations—the adaptive approach proactively looks for new threats and opportunities to improve.

Protecting Vital OT Infrastructure: Key Strategies for OT Penetration Testing
- by Mohannad AlRasan
- May 31, 2024
- Feature
Cyberwarfare adversaries, such as APT groups, target OT systems for maximum impact, exploiting their vulnerabilities.

SPAN Ports and OT Continuous Monitoring: Securing Otherwise Insecure Network Traffic
- by Moreno Carullo
- May 10, 2024
- Feature
Modern networking, SPAN port evolution and protocol interoperability paved the way for operational technology (OT) and ICS network monitoring and cybersecurity.

Seven Tips for Fraud Prevention for Multi-national Companies
- by Zac Amos
- March 22, 2024
- Feature
Fraud prevention is crucial for multinational companies as it safeguards their assets and ensures the trust of stakeholders.

How to Secure Machine Learning Data
- by Zac Amos
- March 18, 2024
- Feature
Data security is paramount in machine learning, where knowledge drives innovation and decision-making.

The Role of AI in Whistleblower Identity Protection and Incident Reporting
- by Devin Partida
- February 23, 2024
- Feature
Artificial Intelligence—through machine learning and natural language processing—enhances the security and anonymity of whistleblowers.
Subscribe to our publications
- eBooks
- Newsletter
Receive the latest automation content, sent to your inbox in the form of enewsletters or ebooks. You pick the topics, we take care of the rest!
Subscribe