Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Do You Have a Set Procedure for Reporting a Data Breach?

In today’s technology world, businesses face the reality that a cyberattack can occur any time. When...
Zac Amos Aug 15, 2023 8:00:00 AM

Exploring Cyber Resilience Through the Rearview Mirror: Dissecting 2022’s Cybersecurity Landscape

Smaller businesses and startups are the targets of over 40% of cyberattacks, with more complex tacti...
Nahla Davies Aug 8, 2023 8:15:00 AM

Endpoint Detection and Response (EDR) Solutions for IT and OT/ICS

Endpoint Detection and Response (EDR) solution, in addition to an essential security controls within...
Muhammad Yousuf Faisal Aug 1, 2023 2:09:58 PM

How Hospital IT Security Compares to Industrial Automation Control System Security

How does hospital IT security compare to industrial automation control system security? Let's take a...

8 Best Use Cases for Robotic Process Automation in Cybersecurity

Robotic process automation (RPA) in cybersecurity is an incredibly helpful tool. While automation ca...
Zac Amos Jul 18, 2023 8:00:00 AM

The Air Gap: Myth and Reality

In theory, an air gap sounds like a good strategy—but it’s not that simple. A common misnomer is to ...
Kaashif Nawaz Jul 11, 2023 8:00:00 AM

Digital Transformation and Cybersecurity Strategy

Digital Transformation (DT) from an industry 4.0 perspective is not a project but rather a strategy ...
Muhammad Yousuf Faisal Jul 5, 2023 12:39:33 PM

What is ETHOS and Why Now? How Will it Help Critical Infrastructure?

A group of cybersecurity companies specialized in ICS and OT security recently launched ETHOS, the E...
Danielle Jablanski Jun 27, 2023 8:00:00 AM

Key Features to Look For in a SOAR Solution

Security operations center teams seeking a security orchestration, automation, and response (SOAR) s...
Zac Amos Jun 21, 2023 11:50:54 AM

Successful Cybersecurity Summit Brings 120+ Technical Leaders to Aberdeen

A leading international organization which sets the standard for automation welcomed over 120 traini...
Ashley Ragan Jun 6, 2023 2:29:52 PM

    Related Posts