5 Security Risks of Rushed Digital Transformation
Undergoing a digital transformation is necessary for many manufacturing businesses, especially when they must stay competitive in challenging market conditions. However, if the responsible parties rush things, they'll increase the likelihood of several security risks.
Strengthening Cybersecurity in Manufacturing: The Path to a Defensible Architecture
Manufacturing is at the forefront of technological advancements, leveraging operational technology (OT) to streamline processes and improve productivity. However, this digital transformation comes with its fair share of cybersecurity challenges.
Three Key Takeaways for OT Leaders from the National Cybersecurity Strategy
The National Cybersecurity Strategy released earlier this year takes a deeper dive into the comprehensive efforts that the administration is making in order to bolster cybersecurity. And it emphasizes the need for public and private collaboration.
The Hidden Risks of Industrial Control System Manufacturers: Why ICS Environments are Vulnerable
Threat actors are increasingly resorting to supply chain attacks to break into critical industrial sectors such as manufacturing, defense, energy, transportation, healthcare, food and agriculture
Five Ways to Protect Critical Infrastructure From Cyberattacks
For any critical infrastructure company, the biggest cybersecurity hazard is an attacker taking control of its IT or operational technology (OT) systems to steal data, or block and disrupt operations.
Understanding and Mitigating Insider Threats in Operational Technology (OT) Systems
One of the biggest risks to operational technology (OT) security is not a zero-day rootkit, but the people onsite day in and day out.
What is IoT Security?
By answering some basic questions on IoT security and pointing you to other resources on how to minimize your IoT cybersecurity risk, this will help you better understand what a robust IoT security strategy looks like.
4 Steps to Take Now Toward Achieving CMMC Compliance
Your role in protecting sensitive defense information from cybersecurity threats is imminent. And so is your requirement to prove that you're up for the task.
With Increased Cyber Risk, OT Leaders Have an Opportunity to Shine
We've had multiple reminders in 2021 that digital connectivity of IT and OT infrastructure requires proportional attention risk management to proactively neutralize ransomware and full array of attack vector focused on industrial environments.
Understanding the Common Vulnerability Scoring System
The common vulnerability scoring system (CVSS) provides manufacturers a way to assess the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.
Surviving a Global Cyberattack - Company Culture Plays a Pivotal Role
Let's go back so I can give you a short overview of what actually happened to Pilz. Sometime in May of 2019, the first phase of the attack was initiated - infection. In general, the infection phase consists of Emails with malicious attachments or links..
IA Targeted in Ethical Hacking Competition: What You Need to Know
The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.
Assessment of Ransomware Event at U.S. Pipeline Operator
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator.
Top Article for 2018 - Protecting Utilities
Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.
How to Keep Your Manufacturing Site Secure in the Age of the IIoT
Manufacturing sites of all kinds now find themselves potentially vulnerable to new types of cyber-attacks - the kinds that turn our own connected devices and equipment against us.
Records 1 to 15 of 32
Featured Product

The maxon IDX Compact Drive with Integrated Positioning Controller
The compact brushless EC-i motor combined with an EPOS4 positioning controller delivers a highly dynamic, powerful drive package with field-oriented control (FOC), high efficiency, and maintenance-free components in a high-quality industrial housing. The maxon IDX drives are suitable for use across the entire speed range (from standstill to maximum speed) and have an extremely high overload capability. Together with a positioning controller, the integrated sensor (single turn) enables absolute positioning.