Inductive Automation Blog

Connecting you to ideas, tips, updates and thought-leadership
from Inductive Automation

Make the Log4j Vulnerability Your Opportunity Carl Gould and… Wed, 12/22/2021 - 14:00
Recently, the Internet went into high alert over a newly discovered vulnerability in a logging library called Log4j that affected many systems that use Java. While we were relieved that Ignition was not affected, it did give us a moment to reflect on what could have been.
How Security Works in the Ignition Perspective Module Travis Cox Mon, 04/13/2020 - 11:50
If you’ve visited this blog at all during the past year, chances are you’ve heard about the Ignition Perspective Module. Since releasing the module in April 2019, we’ve told you quite a bit about how Perspective provides powerful new capabilities for building mobile-first industrial applications natively in HTML5 and CSS3. One aspect of Perspective that we haven’t explored in much detail are its security features, so in this blog post I’ll give you a closer look at how we’ve built Perspective with security in mind, right from the very beginning.
Ignition 8.0.8: HTTP Header Changes, Auditing Updates, Perspective Alarm Journal & More Paul Scott Wed, 02/12/2020 - 10:33
The first Ignition release-train version of 2020 has arrived. Ignition 8.0.8 is here carrying a full cargo of community-requested updates and fixes, plus a new feature that should be a pleasant surprise to many of you. As usual, there are too many updates to mention in one blog post, but I’ll cover the highlights below.
IA Targeted in Ethical Hacking Competition: What You Need to Know Carl Gould and… Wed, 01/29/2020 - 14:11
Last week the latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities. By hosting exciting events with large cash prizes, the ZDI attracts some of the best security researchers and white-hat hackers in the world to participate.