Tag "Safety"

FIDO: Across how many user accounts is your digital identity distributed?

How do you currently register and log in for Internet / Web services? Use a password that at least meets the complexity requirements – keyword: the golden password rules. Or do you already use FIDO-Key? FIDO means “Fast IDentity Online”.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 3 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the third and last part here about Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 2 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and Plant Network Security Monitoring Service before part three deals with the Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 1 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the first part here before part two and three deal with the Simple visualization of existing plant network architecture, Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Verification of Request- The Guardian of NOA(h)’s Ark

This is not the first post on this blog dealing with change in the process industry and its automation. The changes not only affect individual technologies but also their interaction with each other. At the same time, they open up

Read More

Where to store your passwords and how

Whether banking, shopping, mailing, streaming music or TV, forums or social networks – passwords are in demand almost everywhere. As secure as possible, of course. And in order to guarantee the highest possible level of confidence, i.e. confidentiality of your data, you should not only choose a password that is as secure as possible, but also a password that is as individual as possible for each individual account. But be careful! One thing should be clear to everyone: there is no one hundred percent guarantee of security. However, one can and should try to make the security layers around one’s own sensitive data as impenetrable as possible in order to get as close as possible to the optimal protection. Fortunately, there are a number of ways to do this.

Read More

Stahl and security: Full concentration in tune with the times

The company R. Stahl can look back with satisfaction on the first six seminars held in April in some major cities in northern and western Germany under the title “Explosion Protection Day”. Whether in Bremen, Hamburg, Leipzig, Dortmund, Cologne or Frankfurt – Yokogawa had the opportunity to be a lecturer at every event. And with the brand-new topic: Plant Security.

Read More

Crucial basic measures to ensure business resilience (Part 2/2)

After the first part of the blog article “Decisive basic measures to ensure corporate resilience” focused on the core tasks of Business Impact Analysis (BIA) and the foundations for resilience via Identity and Access Management (IAM), the second part now follows. Here the core tasks are to be brought up for discussion up to advantages of the Identity and Access management.

Read More

Safety needs friends… (Part 2/2)

As we have seen in part 1 of this article, there are processes that cause a system’s performance to (prematurely) deteriorate or that the system can no longer fulfil its purpose. As we will see, these processes are not so different for cars (part 1) and safety systems in the process industry. However, there is a big difference in the rules and regulations during operation. We drivers have a bit of the “main inspection” and perhaps the “inspection booklet” of the manufacturer on our backs. Otherwise the legislator more or less leaves it to us to admonish to be on the road with a “safe” vehicle. This is quite different with regard to safety in the process industry. There is a multitude of laws, rules etc. that must be observed.

Read More

TDLS8000: Maintenance-free, SIL2 certified and explosion-proof

In almost every chemical production plant, it is always necessary to store various substances in containers or tank farms. Depending on the chemical substance, this can from time to time result in an explosion hazard. For this reason, elementary protection against a possible explosion must be provided. In the best case scenario, this should be done in such a way that no explosive gas mixture can form in the gas phase of the container. In the age of ever-increasing safety requirements, a current safety assessment may make it necessary to actually record the oxygen content – especially if the device in question has been classified as a SIL (safety integrity level) application.  This is exactly where Yokogawa’s TDLS8000 laser comes into play.

Read More