IA Targeted in Ethical Hacking Competition: What You Need to Know

The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.

Assessment of Ransomware Event at U.S. Pipeline Operator

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator.

Top Article for 2018 - Protecting Utilities

Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.

How to Keep Your Manufacturing Site Secure in the Age of the IIoT

Manufacturing sites of all kinds now find themselves potentially vulnerable to new types of cyber-attacks - the kinds that turn our own connected devices and equipment against us.

How the Manufacturing Industry Can Defend Against Cyberattacks

In the manufacturing industry, you have no option to continue ignoring the threat to your data. Digital security must take as much precedence, if not more, as the physical security of your facility.

Digital Transformations Carry Cybersecurity Concerns

The more digitized the manufacturing process becomes, the greater the potential for an attack if a manufacturer is not able to assure security measures on their identified assets

The Industrial IoT Risks You Must Not Ignore in 2018

Scott Allen for Sys-Con Media: Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed.

SCADAfence Secures $10 Million in Funding to Protect Smart Manufacturing and Critical Infrastructure Networks from Cyber Attacks

Investors include JVP, NexStar Partners and Japan's Global Brain; funds will be used to boost go-to-market efforts and expand research and development operations

Defending 3D Printers From Hackers

Charles Q. Choi for IEEE Spectrum: Researchers reveal three methods of verifying that 3d-printed parts have not been compromised by someone hacking the printer itself.

The ioTrust Security Solution

Manufacturers who can uniquely identify individual parts in a secure manner have an advantage over the competition, which is struggling to master this new concept. With ioTrust, manufacturers can associate their products with a secure, unique identity, that can extend through the supply chain.

IIoT And The CyberThreat: A Perfect Storm Of Risk

Chris Grove for MBT Mag: Some organizations have a false sense of security and believe their industrial control systems cant be easily compromised.

Why PKI matters for the IIoT

Strong authentication of all devices within an IIoT network is one of the fundamental requirements for securing these networks.

Cybersecurity in the Factory

Technology for Industrial Control Systems and SCADA are now available that allow for continuous monitoring of these critical systems. A baseline is created and any deviations can be alerted and acted upon.

Manufacturers raise investment in next-gen tech, survey says

Dustin Walsh for Crain's Detroit Business:  U.S. manufacturers are rapidly boosting investment in advanced digital technologies, according to a survey to be released Monday by Troy-based technology business association Automation Alley.  The survey coincides with the association's 2017 Technology Industry Outlook event on Feb. 13 at the Detroit Institute of Arts. Nearly 400 manufacturing and technology business leaders are expected to attend. According to the survey, 85 percent of U.S. manufacturing executives responded they plan to increase existing budgets for new technologies, with nearly a third planning to increase budgets by up to 15 percent.  More than half of the respondents said they have a dedicated budget to technologies described as Industry 4.0, with the top three being cloud, cybersecurity and data analytics.   Cont'd...

China Adopts Cybersecurity Law Despite Foreign Opposition

Bloomberg News:  China has green-lit a sweeping and controversial law that may grant Beijing unprecedented access to foreign companies’ technology and hamstring their operations in the world’s second-largest economy. The Cyber Security Law was passed by the Standing Committee of the National People’s Congress, China’s top legislature, and will take effect in June, government officials said Monday. Among other things, it requires internet operators to cooperate with investigations involving crime and national security, and imposes mandatory testing and certification of computer equipment. Companies must also give government investigators full access to their data if wrong-doing is suspected. China’s grown increasingly aggressive about safeguarding its IT systems in the wake of Edward Snowden’s revelations about U.S. spying, and is intent on policing cyberspace as public discourse shifts to online forums such as Tencent Holdings Ltd.’s WeChat. The fear among foreign companies is that requirements to store data locally and employ only technology deemed “secure” means local firms gain yet another edge over foreign rivals from Microsoft Corp. to Cisco System Inc.   Cont'd...

Records 16 to 30 of 36

First | Previous | Next | Last

Featured Product

Rapid Prototyping with the Modular Motor Series

Rapid Prototyping with the Modular Motor Series

Quick to configure. Quick to build. Quick to deliver. Parvalux understands the importance of getting product in the hands of customers quickly and efficiently. The Modular Range does just that allowing customers to configure their own solution, selecting motor and gearbox, adding encoders and brakes to create a solution perfectly suited for their specific applications such as conveyor belt systems, picking systems, parcel sorting equipment, pallet shuttles and automated storage and retrieval systems (ASRS). Read our modular range guide for specifics.