Blog

Blog

The Top 20 Secure PLC Coding Practices. Part 6 - Use cryptographic and / or checksum integrity checks for PLC code

The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code

Use cryptographic hashes, or checksums if cryptographic hashes are unavailable, to check PLC code integrity and raise an alarm when they change  Security Objective Target Group Integrity of PLC Logic Product Supplier Integration / Maintenance Service Provider Asset...

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.