Building a Resilient World:

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

8 Best Use Cases for Robotic Process Automation in Cybersecurity

Robotic process automation (RPA) in cybersecurity is an incredibly helpful tool. While automation ca...
Zac Amos Jul 18, 2023 8:00:00 AM

The Air Gap: Myth and Reality

In theory, an air gap sounds like a good strategy—but it’s not that simple. A common misnomer is to ...
Kaashif Nawaz Jul 11, 2023 8:00:00 AM

Digital Transformation and Cybersecurity Strategy

Digital Transformation (DT) from an industry 4.0 perspective is not a project but rather a strategy ...
Muhammad Yousuf Faisal Jul 5, 2023 12:39:33 PM

What is ETHOS and Why Now? How Will it Help Critical Infrastructure?

A group of cybersecurity companies specialized in ICS and OT security recently launched ETHOS, the E...
Danielle Jablanski Jun 27, 2023 8:00:00 AM

Key Features to Look For in a SOAR Solution

Security operations center teams seeking a security orchestration, automation, and response (SOAR) s...
Zac Amos Jun 21, 2023 11:50:54 AM

How Do Automated Intrusion Prevention Systems Work?

Risk management comprises everything from software to social tactics. Every day, a new strategy prom...
Zac Amos Jun 16, 2023 4:05:35 PM

Successful Cybersecurity Summit Brings 120+ Technical Leaders to Aberdeen

A leading international organization which sets the standard for automation welcomed over 120 traini...
Ashley Ragan Jun 6, 2023 2:29:52 PM

How to Protect Sensitive Health-Related Information Against Cyberattacks

Digital transformation has disrupted the healthcare industry. New online platforms and applications ...
Jonas Iggbom Jun 2, 2023 8:00:00 AM

Metal Fabricators Must Protect Themselves from Cyberattacks

Every industry is vulnerable to cybersecurity threats, including metal fabrication. Protecting this ...
Emily Newton May 23, 2023 8:00:00 AM

Recent Outlook of Cybersecurity Threats in the Construction Sector

Since the global coronavirus pandemic began in 2020, there has been a huge shift toward increased re...
Nahla Davies May 16, 2023 7:00:00 AM

    Related Posts