Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Why Collaboration Is Essential for Cybersecurity Teams

Today’s cybersecurity workforce faces seemingly insurmountable workloads and increasing pressure to ...
Zac Amos Feb 27, 2024 10:40:13 AM

Behind the Screen of OT/IoT: Uncovering 2023's Cybersecurity Frontiers

As our world becomes increasingly interconnected, the intertwining web of Operational Technology (OT...
Nahla Davies Sep 5, 2023 3:44:32 PM

Endpoint Detection and Response (EDR) Solutions for IT and OT/ICS

Endpoint Detection and Response (EDR) solution, in addition to an essential security controls within...
Muhammad Yousuf Faisal Aug 1, 2023 2:09:58 PM

Keeping IIoT Components Secure with ISASecure

The industrial internet of things (IIoT) has enabled the digital transformation of industrial facili...
Liz Neiman Apr 11, 2023 9:51:49 AM

More Than 17 Million Control System Cyber Incidents are Hidden in Plain Sight

Control system cyber incidents are more common and dangerous than most security specialists and indu...
Joe Weiss Feb 28, 2023 5:30:00 AM

How ChatGPT is Impacting Cybersecurity

The COVID-19 pandemic expedited artificial intelligence (AI) innovations, driving the push to delega...
Zac Amos Feb 21, 2023 5:30:00 AM

Why are Cyberattacks Shifting to ICS?

Firewalls and two-factor authentication have become the norm when protecting our information technol...
Nahla Davies Feb 14, 2023 5:30:00 AM

OT Security Dozen Part 4: IDS/AD Solutions

This is Part 4 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal Jan 31, 2023 5:30:00 AM

Double Extortion Ransomware: What It Is and How to Respond

New attack methods in the cybersecurity landscape continue to emerge in the digitally driven world. ...
Zac Amos Jan 17, 2023 5:30:00 AM

Defending Remote-Friendly Environments from Cyberattacks

This blog has been repurposed from the December 2022 issue of InTech
Damon Purvis Jan 10, 2023 5:30:00 AM

    Related Posts