News

29.04.2019 15:31
Article

"In the course of digitalization and the Industry 4.0 "revolution", the topic of industrial remote maintenance has taken on a new significance for plant operators. Whereas some time ago it was just a matter of accessing individual servers and desktops in the office sector, today it is access to fire alarm systems, robots, cranes, water turbines and other production and automation components.

This means that the topic of remote maintenance has also arrived in the most sensitive areas of industrial companies, namely in the middle of the production and plant network. Operators must therefore inevitably deal with the topic of remote maintenance and at the same time pay attention to the special requirements (safety and availability) in industrial plants." - www.sichere-industrie.de

  1. How to avoid the wrong purchase of a remote maintenance solution with a requirements analysis (Part 1)
  2. Why a remote maintenance concept is necessary to avoid putting your system at risk (Part 2)
  3. Which regulations help you to save work during remote maintenance (Part 3)
  4. 6 potential problems with remote maintenance solutions that you need to be aware of as an operator (Part 4)

"In the course of digitalization and the Industry 4.0 "revolution", the topic of industrial remote maintenance has taken on a new significance for plant operators. Whereas some time ago it was just a…

show more show less
29.04.2019 15:30
Article

"Maintaining an overview of complicated automation networks is no easy task. Here it helps to use models that create the necessary degree of clarity and structure through abstraction. One of these is the Purdue Reference Model." - www.sichere-industrie.de

"Maintaining an overview of complicated automation networks is no easy task. Here it helps to use models that create the necessary degree of clarity and structure through abstraction. One of these is…

show more show less
25.04.2019 17:15
News

Dennis-Kenji Kipker | Dario Scholz: EU Parliament passes EU Cyber-Security Act

On March 12, 2019, the EU Parliament adopted the Cybersecurity Regulation (Cybersecurity Act) after an agreement on the main content of the regulation had already been reached between the Council, Commission and Parliament in a trilogue in December 2018.

Dr. Dennis-Kenji Kipker and Dario Scholz published a focus article on this topic in MultiMedia and Law. The complete article is available as PDF.

On March 12, 2019, the EU Parliament adopted the Cybersecurity Regulation (Cybersecurity Act) after an agreement on the main content of the regulation had already been reached between the Council, Co…

show more show less
25.04.2019 16:30
Article

"The ISA/IEC 62443 standard represents a holistic approach to industrial security in the production and automation sector. We give you a brief overview as an introduction to the standard." - www.sichere-industrie.de

"The ISA/IEC 62443 standard represents a holistic approach to industrial security in the production and automation sector. We give you a brief overview as an introduction to the standard." - www.sich…

show more show less
25.04.2019 16:28
Article

"Predictive maintenance is a trending topic in Industry 4.0, but what do you need to consider in addition to the opportunities for more efficient maintenance of your systems? Can you benefit from predictive maintenance without revealing important internal information?" - www.sichere-industrie.de

"Predictive maintenance is a trending topic in Industry 4.0, but what do you need to consider in addition to the opportunities for more efficient maintenance of your systems? Can you benefit from pre…

show more show less
25.04.2019 16:27
Article

"Setting up and operating an asset management system involves a great deal of effort. An asset inventory is the first step on the way to an orderly overview of your assets." - www.sichere-industrie.de

"Setting up and operating an asset management system involves a great deal of effort. An asset inventory is the first step on the way to an orderly overview of your assets." - www.sichere-industrie.d…

show more show less
25.04.2019 16:26
Article

"The defense in depth approach implements IT security measures on several layers. We explain why it is so important for industrial networks and list measures that support a comprehensive security concept." - www.sichere-industrie.de

"The defense in depth approach implements IT security measures on several layers. We explain why it is so important for industrial networks and list measures that support a comprehensive security con…

show more show less
25.04.2019 16:25
Article

"In order to effectively protect your digitally networked systems, it is important to know the biggest threats. Find out what they are here!

What are the main threats to industrial control systems (ICS)? Das BSI hat auch für 2016 wieder eine Übersicht der Bedrohungen herausgegeben, diese haben wir als Vorlage verwendet, um Sie zu präsentieren und mit Kontext zu hinterlegen. Die Kenntnis von Schwachstellen und Bedrohungen sind wichtig, um effektiv IT-Security einführen und pflegen zu können." - www.sichere-industrie.de

"In order to effectively protect your digitally networked systems, it is important to know the biggest threats. Find out what they are here!

What are the main threats to industrial control systems (IC…

show more show less