Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Securing Industry 4.0

As we head into the Industry 4.0 era—where connected Internet of Things (IoT) devices and automation...
David Nosibor May 10, 2022 5:30:00 AM

Q&A: The Global Threat Landscape Report by FortiGuard Labs

The following is an interview with Derek Manky, Chief Security Strategist & VP Global Threat Int...
Steven Aliano May 3, 2022 5:30:00 AM

OT Security Dozen Part 1: A Year of OT/ICS Cybersecurity Assessments

This is Part 1 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal Apr 26, 2022 5:30:00 AM

Understanding Railway Cybersecurity

The railway industry is increasingly viewed as a viable target for cybercriminals. Signaling systems...
Nikhil Kapoor Apr 19, 2022 5:30:00 AM

ISA Launches New Microlearning Modules for CISOs

As a senior-level executive, the chief information security officer (CISO) plays a pivotal role in e...
Steven Aliano Apr 14, 2022 5:30:00 AM

Using Risk Analysis to Optimize OT SOC Operations

Here’s a scenario that may sound all too familiar: The chief executive officer (CEO) catches you in ...
Ilan Barda Mar 29, 2022 5:30:00 AM

Excerpt: SBoM is Crucial in Software Development

The following is an excerpt of the recently published ISS Source article, "SBoM Is Crucial In Softwa...
Cassie Crossley Mar 15, 2022 5:30:00 AM

Excerpt: A Community for Workforce Development in Industrial Cyber

The following is an excerpt of the National Initiative for Cybersecurity Education (NICE) Winter 202...
Steven Aliano Mar 8, 2022 5:30:00 AM

Separating Man from Machine: KVM Reduces Security Threats

Modern keyboard, video, and mouse (KVM) systems are not just a way to improve efficiency and flexibi...
Don Hosmer Mar 1, 2022 5:30:00 AM

Cloud Computing and Cybersecurity: Everything You Need to Know

The drive to cloud-native architectures and innovation creates new forms of complexity that IT organ...
Aaron Smith Feb 22, 2022 5:30:00 AM

    Related Posts