• Standard ISO/IEC 27032:2012 and PI System

    Dear all,     Some our customers and sales people ask if PI system meet requirements of the standard ISO/IEC 27032:2012 (https://www.iso.org/standard/44375.html ) and if yes, can we get some sort of proof (...
    aivanova
    last modified by aivanova
  • Cyber Security 'Near Misses'

    Glenn Aydell's "Cyber Security and the Chemical Sector" presentation at the 2018 SANS ICS Summit provides a great collection of near misses. Learning from near misses is a critical step in most safety programs and a h...
    Bryan Owen
    created by Bryan Owen
  • 5-Jun-2018 Critical Infrastructure and IT/OT Integration

    Although lot has already been written about IT and OT integration there is so much more to share. So I jumped at the chance to represent a supplier’s perspective on Critical Infrastructure Protection and IT/OT i...
    Bryan Owen
    created by Bryan Owen
  • Additional Resources for PI System Security

    Looking for additional resources for security?   Learning resources: Check out the different learning paths to find the right training materials for you! Hands-on Labs: 2017 Hands-on Lab: Extending the PI Se...
    Brian
    created by Brian
  • Security Activities at PI World '18

    PI World 2018 is just around the corner.  The kick-off reception is one week from this evening.  As we do each year, we would like to share the security related activities that are happening during the confe...
    Brian
    created by Brian
  • System Hardening and Configuration as Code: PI System Security Activities on Day 3 of PI World 2018!

    There are a couple options to learn about PI System hardening on day 3 of PI World 2018.  The session Extreme PI System Hardening in developer track 4 at 10:30 AM is a “How-To” session that will tak...
    hpaul
    created by hpaul
  • Coresight Squared – What’s next? Kerberos and more..

    Coresight Squared  This series consists of three parts: 1. Server Core Installation and Configuration 2. PI Coresight Installation 3. Extras: Kerberos and more << you're here!     At this po...
    lmlcoch
    last modified by lmlcoch
  • Error retrieving trust details for trust RPC Invoke failed[-12002] Code Not Found in PInt

    Hi All,   I am having an issue in a development PI Data archive server version 2012 3.4.390.   PI SMT is displaying an error retrieving the list of PI Trusts (Security > Mappings & Trusts). The fol...
    maiajo
    created by maiajo
  • All Industrial Software is Toxic?

    The trend of describing malware in terms of a ‘virus’ has been credited to Fred Cohen’s ‘Computer Viruses - Theory and Experiments’ paper circa 1984. The virus analogy is still with us to...
    Bryan Owen
    created by Bryan Owen
  • NCSAM 2017 – Week 2: Cyber Security in the Workplace

    National Cyber Security Awareness Month 2017 has dedicated this week to creating a culture of shared responsibility for addressing the most common threats to organizations. Let’s explore shared responsibility wi...
    Bryan Owen
    created by Bryan Owen
  • National Cyber Security Awareness Month (NCSAM 2017)

    Awareness is “the key” for advancing the prevention and tempering severity of cyber incidents.  Believe it, embrace it, live it, it’s true! Belief: People are more apt to do the right things if...
    Bryan Owen
    created by Bryan Owen
  • 26-Sep-2017 NERC CIP Today and Future

    Hello Fellow CIP Followers,   Jerome Farquharson of Burns & McDonnell presented on NERC CIP Today and Future at the OSIsoft T&D users group meeting last week in NOLA. In addition to review of the threat...
    Bryan Owen
    created by Bryan Owen
  • PI OMF Relay

    In session's "UC 2017 Hands-On Lab - Develop Data Ingress Applications on Your Favorite Edge Devices Using OMF" manual, for configuring PI server, it is mentioned as In this lab, that software is the PI OMF Relay, wh...
    Ashutosh-Mishra
    created by Ashutosh-Mishra
  • DefCon25 - Breaking Wind: Adventures in Hacking Wind Farm Control Network

    Wind power is now an important energy source for the electric grid and this continues to be an exciting time in history for all renewables. What could go wrong?   University of Tulsa conducted a 2 year red team ...
    Bryan Owen
    created by Bryan Owen
  • Watch out for Fish Tanks!

    A friend sent me a very interesting article. An internet-connected fish tank let hackers into a casino's network - Help Net Security   “Smart devices are often purchased and introduced into corporate n...
    Jarita Sirois
    created by Jarita Sirois
  • Anti-Virus is dead. Long live anti-virus! (redux)

    Anti-virus has been declared dead many times.  Makers of AV engines themselves even say so.   Why?  Because AV is a feedback control. There is always some lag time as AV isn't really designed to protec...
    Bryan Owen
    created by Bryan Owen
  • "The Coffee Break" % reddit Tales from Techsupport

    This 'Coffee Break' scenario is all too likely today. Technical support and their remote monitoring system are heroes in this story! https://www.reddit.com/r/talesfromtechsupport/comments/6ovy0h/how_the_coffeemachine...
    Bryan Owen
    created by Bryan Owen
  • Part II: OSIsoft and NERC CIP-013, Cyber Security Supply Chain Risk Management

    The revised NERC CIP-013 draft standards for Cyber Security Supply Chain Risk Management appear on course to meet FERC’s deadline.  However, FERC itself appears to be in transition with Acting Chair Cheryl ...
    Bryan Owen
    created by Bryan Owen
  • (PI) Security update

    Intro I figured it’s about time to write an updated version of my PI System Security blog. OSIsoft has done a lot of changes on security since 2014.   First we can take the question, why do you need to res...
    Jarita Sirois
    created by Jarita Sirois
  • Cyber Security, PI and IoT! UC 2017

    The OSIsoft Users Conference 2017 was a great event.  If you weren't able to attend, all of the papers are available online for you to see.  I'd like to highlight those with cyber security related informatio...
    Brian
    last modified by Brian