Three Key Takeaways for OT Leaders from the National Cybersecurity Strategy

The National Cybersecurity Strategy released earlier this year takes a deeper dive into the comprehensive efforts that the administration is making in order to bolster cybersecurity. And it emphasizes the need for public and private collaboration.

The Hidden Risks of Industrial Control System Manufacturers: Why ICS Environments are Vulnerable

Threat actors are increasingly resorting to supply chain attacks to break into critical industrial sectors such as manufacturing, defense, energy, transportation, healthcare, food and agriculture

Five Ways to Protect Critical Infrastructure From Cyberattacks

For any critical infrastructure company, the biggest cybersecurity hazard is an attacker taking control of its IT or operational technology (OT) systems to steal data, or block and disrupt operations.

Understanding and Mitigating Insider Threats in Operational Technology (OT) Systems

One of the biggest risks to operational technology (OT) security is not a zero-day rootkit, but the people onsite day in and day out.

What is IoT Security?

By answering some basic questions on IoT security and pointing you to other resources on how to minimize your IoT cybersecurity risk, this will help you better understand what a robust IoT security strategy looks like.

4 Steps to Take Now Toward Achieving CMMC Compliance

Your role in protecting sensitive defense information from cybersecurity threats is imminent. And so is your requirement to prove that you're up for the task.

With Increased Cyber Risk, OT Leaders Have an Opportunity to Shine

We've had multiple reminders in 2021 that digital connectivity of IT and OT infrastructure requires proportional attention risk management to proactively neutralize ransomware and full array of attack vector focused on industrial environments.

Understanding the Common Vulnerability Scoring System

The common vulnerability scoring system (CVSS) provides manufacturers a way to assess the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.

Surviving a Global Cyberattack - Company Culture Plays a Pivotal Role

Let's go back so I can give you a short overview of what actually happened to Pilz. Sometime in May of 2019, the first phase of the attack was initiated - infection. In general, the infection phase consists of Emails with malicious attachments or links..

IA Targeted in Ethical Hacking Competition: What You Need to Know

The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.

Assessment of Ransomware Event at U.S. Pipeline Operator

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator.

Top Article for 2018 - Protecting Utilities

Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.

How to Keep Your Manufacturing Site Secure in the Age of the IIoT

Manufacturing sites of all kinds now find themselves potentially vulnerable to new types of cyber-attacks - the kinds that turn our own connected devices and equipment against us.

How the Manufacturing Industry Can Defend Against Cyberattacks

In the manufacturing industry, you have no option to continue ignoring the threat to your data. Digital security must take as much precedence, if not more, as the physical security of your facility.

Digital Transformations Carry Cybersecurity Concerns

The more digitized the manufacturing process becomes, the greater the potential for an attack if a manufacturer is not able to assure security measures on their identified assets

Records 16 to 30 of 45

First | Previous | Next | Last

Featured Product

ResinDek® TRIGARD® ESD ULTRA FOR HIGH-TRAFFIC ROBOTIC APPLICATIONS

ResinDek® TRIGARD® ESD ULTRA FOR HIGH-TRAFFIC ROBOTIC APPLICATIONS

To maximize the productivity of an autonomous mobile robot (AMR) or automatic guided vehicle (AGV) deployment, it's critical to create the optimal environment that allows the vehicles to perform at their peak. For that reason, Cornerstone Specialty Wood Products, LLC® (www.resindek.com) created the TriGard® ESD Ultra finish for its ResinDek® engineered flooring panels. The TriGard ESD Ultra finish is ideal for high-traffic robotic applications characterized by highly repetitive movement patterns and defined travel paths.

Manufacturing and Automation - Featured Company

BigRep

BigRep

Founded in 2014, BigRep set sail to transform the 3D printing and manufacturing business. With its 1m3 volume, the BigRep ONE opens the gateway to a new dimension of 3D printing and 3D manufacturing, while the BigRep STUDIO allows fast and precise large-scale 3D printing. From furniture to vehicles to robotics, we think everything is possible. We want you to envision everything from human scale robot parts, sculptural artworks in all their full-dimensional glory, and dream the impossible world-changing designs of tomorrow while enabling you to print them today using one of our 3D printers.