SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
The Top 20 Secure PLC Coding Practices. Part 18 – Log PLC uptime and trend it on the HMI

The Top 20 Secure PLC Coding Practices. Part 18 – Log PLC uptime and trend it on the HMI

by Eugeniusz Wypior | 20 January 2022 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 18 – Log PLC uptime and trend it on the HMI Log PLC uptime to know when it’s been restarted. Trend and log uptime on the HMI for diagnostics.  Security Objective Target Group Monitoring Integration /...
The Top 20 Secure PLC Coding Practices. Part 17 – Summarise PLC cycle times and trend them on the HMI

The Top 20 Secure PLC Coding Practices. Part 17 – Summarise PLC cycle times and trend them on the HMI

by Eugeniusz Wypior | 12 January 2022 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 17 – Summarise PLC cycle times and trend them on the HMI Summarize PLC cycle time every 2-3 seconds and report to HMI for visualization on a graph Security Objective Target Group Monitoring Integration /...
The Top 20 Secure PLC Coding Practices. Part 16 – Define a safe process state in case of a PLC restart

The Top 20 Secure PLC Coding Practices. Part 16 – Define a safe process state in case of a PLC restart

by Eugeniusz Wypior | 5 January 2022 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 16 – Define a safe process state in case of a PLC restart Define safe states for the process in case of PLC restarts (e.g., energize contacts, de-energize, keep the previous state) Security Objective...
The Top 20 Secure PLC Coding Practices. Part 15 – Restrict third-party data interfaces

The Top 20 Secure PLC Coding Practices. Part 15 – Restrict third-party data interfaces

by Eugeniusz Wypior | 23 December 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 15 – Restrict third-party data interfaces Restrict the type of connections and available data for 3rd party interfaces. The connections and/or data interfaces should be well defined and restricted to...
The Top 20 Secure PLC Coding Practices. Part 14 – Disable unneeded / unused communication ports and protocols

The Top 20 Secure PLC Coding Practices. Part 14 – Disable unneeded / unused communication ports and protocols

by Eugeniusz Wypior | 15 December 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 14 – Disable unneeded / unused communication ports and protocols PLC controllers and network interface modules generally support multiple communication protocols that are enabled by default. Disable...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
office@seqred.pl

Privacy Policy All rights reserved © SEQRED 2021