Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Cybersecurity in Food Processing: A Hidden Battle for Safe Sustenance

According to research, 2020 saw cyberattacks against the food and agriculture sector increase by 607...
Nahla Davies Sep 22, 2023 11:44:39 AM

How Ransomware Can Evade Antivirus Software

Even if you have up-to-date antivirus software, there’s still a chance ransomware can infect your co...
Zac Amos Sep 12, 2023 8:00:00 AM

Behind the Screen of OT/IoT: Uncovering 2023's Cybersecurity Frontiers

As our world becomes increasingly interconnected, the intertwining web of Operational Technology (OT...
Nahla Davies Sep 5, 2023 3:44:32 PM

Beyond SDL: Elevating Cybersecurity with Secure Lifecycle Management

Schneider Electric has worldwide manufacturing centers that support critical infrastructures for cus...
Andrew Kling Aug 29, 2023 8:00:00 AM

xDR in Operational Technology: Approach and Adaption

Operational technology (OT) is the backbone of automation, manufacturing systems and other utilities...
Achal Lekhi Aug 22, 2023 12:31:01 PM

Do You Have a Set Procedure for Reporting a Data Breach?

In today’s technology world, businesses face the reality that a cyberattack can occur any time. When...
Zac Amos Aug 15, 2023 8:00:00 AM

Exploring Cyber Resilience Through the Rearview Mirror: Dissecting 2022’s Cybersecurity Landscape

Smaller businesses and startups are the targets of over 40% of cyberattacks, with more complex tacti...
Nahla Davies Aug 8, 2023 8:15:00 AM

Endpoint Detection and Response (EDR) Solutions for IT and OT/ICS

Endpoint Detection and Response (EDR) solution, in addition to an essential security controls within...
Muhammad Yousuf Faisal Aug 1, 2023 2:09:58 PM

How Hospital IT Security Compares to Industrial Automation Control System Security

How does hospital IT security compare to industrial automation control system security? Let's take a...

8 Best Use Cases for Robotic Process Automation in Cybersecurity

Robotic process automation (RPA) in cybersecurity is an incredibly helpful tool. While automation ca...
Zac Amos Jul 18, 2023 8:00:00 AM

    Related Posts