• About
  • Advertise
  • Subscribe
  • Contact
  • Events
Sunday, February 8, 2026
Newsletter
SUBSCRIBE
  • News
    • Company news
    • People and appointments
    • Contracts awarded
  • Features
  • Critical minerals
    • Chromium
    • Cobalt
    • Lithium
  • Commodities
    • Alumina
    • Coal
    • Copper
    • Gold
    • Iron ore
    • Nickel
    • Oil and gas
    • Uranium
  • Smart mining
    • Industrial Automation
    • Big Data
    • Cyber Security
    • IOT
  • Sustainability
    • Circular economy
    • Environmental management
    • Mine rehabilitation
    • Energy efficiency
    • Water and waste management
  • Asset Management
    • Condition Assessment
    • Instrumentation, Control & Monitoring
    • Maintenance
No Results
View All Results
  • News
    • Company news
    • People and appointments
    • Contracts awarded
  • Features
  • Critical minerals
    • Chromium
    • Cobalt
    • Lithium
  • Commodities
    • Alumina
    • Coal
    • Copper
    • Gold
    • Iron ore
    • Nickel
    • Oil and gas
    • Uranium
  • Smart mining
    • Industrial Automation
    • Big Data
    • Cyber Security
    • IOT
  • Sustainability
    • Circular economy
    • Environmental management
    • Mine rehabilitation
    • Energy efficiency
    • Water and waste management
  • Asset Management
    • Condition Assessment
    • Instrumentation, Control & Monitoring
    • Maintenance
No Results
View All Results
Home Smart mining Cyber Security

Safety meets security: how to set up machines safely

by Sarah MacNamara
June 24, 2024
in Asset Management, Cyber Security, Risk management, Smart mining, Sponsored Editorial
Reading Time: 3 mins read
A A
Phoenix Contact

Phoenix Contact

Share on FacebookShare on Twitter

The progressive digitalisation and networking of machines and systems has lead to an increasing fusion of safety and security as cybercrime becomes one of the biggest business risks facing companies today.  

A significant number of companies have already experienced cyberattacks resulting in production downtime, with ‘Triton’ being the first notable case that has breached security-related mechanisms in an automation system through a cyberattack.

Regulatory developments in the EU are currently being pursued to address this issue, including the Machinery Regulation (MVO), the Cyber Resilience Act and NIS2. The Machinery Regulation, which will be applied from 20 January 2027, specifies EU-wide protection objectives for the design and construction of machinery. It considers new risks and adapts the security specifications to the current state of technological progress. The Cyber Resilience Act protects consumers and companies that purchase or use digital products and software. As part of this, binding cybersecurity standards have been defined for manufacturers and distributors and a CE marking has been specified for cybersecure products made available in the European Economic Area.  

In this context, it is crucial to recognise that safety and security can no longer be considered in isolation; they are complementary aspects of machine and system security. The security of machines and systems depends both on physical protective measures (safety) and on measures to prevent cyber threats (security). A holistic approach that considers both aspects and utilises synergies is promoted by the new Machinery Regulation and the Cyber Resilience Act. This document describes such a holistic approach in broad terms and is intended to serve as an initial orientation. 

A reference architecture from the perspective of an operator describes how a safety application can be created to be ‘secure’.

Additionally, a record of data traffic for Ethernet connections should be provided for subnetworks at the control level of machines and production lines. Ethernet devices should also undergo a vulnerability test. This includes replacing the manufacturer’s default passwords. Network segmentation between machines is also recommended to restrict unauthorised access as much as possible.  

The primary approach to overcoming threat potentials lies in the detection and prevention of unauthorised access from outside the ‘manufacturing zone’ so that no safety-critical changes can be made. Furthermore, network segmentation should prevent unauthorised access from machine one to machine two (and vice versa). 

This sponsored editorial is brought to you by Phoenix Contact. Learn more at Safety Meets Security.  

Related Posts

Mining trucks, Australia

Mining insights from the data smog

by Engel Schmidl
December 22, 2025

Data is gold – but only if you know how to harness it for productive insights. Writer David Shenk coined...

Image: sharafmaksumov/stock.adobe.com

Landmark AI investment to ‘strengthen’ the sector

by Staff Writer
December 4, 2025

Following the launch of the Federal Government’s National AI Plan, the Minerals Council of Australia (MCA) is advocating for a...

The system is designed to improve classification efficiency. Images: Kevin Galvin

New technology advances fine particle recovery

by Prealene Khera
November 27, 2025

An update to an advanced, gravity-based separation device, driven by the University of Newcastle, aims to improve fine particle recovery...

Read our magazine

Join our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.


Mining has been developed to keep you up-to-date with all of the latest news, discussions, innovation and projects in the Australian mining sector. Our vision is that this hub will arm decision makers all over Australia with the critical information they need to be ahead of technologies and trends to improve operations and compete in an international market.

Subscribe to our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.

About Mining Magazine

  • Home
  • About
  • Advertise
  • Contact
  • Digital Magazine
  • Subscribe
  • Events
  • Terms & Conditions
  • Privacy Collection Notice
  • Privacy Policy

Popular Topics

  • News
  • Spotlight
  • Projects
  • Critical minerals
  • Commodities
  • Sustainability
  • Exploration
  • Investment

© 2026 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited

No Results
View All Results
NEWSLETTER
SUBSCRIBE
  • News
    • Company news
    • People and appointments
    • Contracts awarded
  • Features
  • Critical minerals
    • Chromium
    • Cobalt
    • Lithium
  • Commodities
    • Alumina
    • Coal
    • Copper
    • Gold
    • Iron ore
    • Nickel
    • Oil and gas
    • Uranium
  • Smart mining
    • Industrial Automation
    • Big Data
    • Cyber Security
    • IOT
  • Sustainability
    • Circular economy
    • Environmental management
    • Mine rehabilitation
    • Energy efficiency
    • Water and waste management
  • Asset Management
    • Condition Assessment
    • Instrumentation, Control & Monitoring
    • Maintenance
  • About
  • Advertise
  • Contact
  • Subscribe
  • Events

© 2026 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited