Three Key Takeaways for OT Leaders from the National Cybersecurity Strategy

The National Cybersecurity Strategy released earlier this year takes a deeper dive into the comprehensive efforts that the administration is making in order to bolster cybersecurity. And it emphasizes the need for public and private collaboration.

Three Ways Authentication Technologies Help Smart Factories Cut Costs

Modern authentication and access control systems can help by preventing unauthorized use of machines and ensuring that the correct parts and consumables are used.

What is IoT Security?

By answering some basic questions on IoT security and pointing you to other resources on how to minimize your IoT cybersecurity risk, this will help you better understand what a robust IoT security strategy looks like.

MQTT and the Purdue Model Work Together for IIoT Security

The demand for data from both OT teams and cloud and enterprise systems has grown exponentially, but the manufacturing industry is still tied closely to the Purdue Model.

With Increased Cyber Risk, OT Leaders Have an Opportunity to Shine

We've had multiple reminders in 2021 that digital connectivity of IT and OT infrastructure requires proportional attention risk management to proactively neutralize ransomware and full array of attack vector focused on industrial environments.

IA Targeted in Ethical Hacking Competition: What You Need to Know

The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.

Why Manufacturers Need to Shift Their Disaster Recovery Mindset

While it's important for manufacturers to have sound cybersecurity measures and protocols in place, it's equally important to have IT resilience and orchestration solutions at the ready.

Security Concerns with AI in Manufacturing

Security incidents occur when access and change management privileges are not strictly controlled and back-ups are not maintained. Overseeing proper operation and implementation of AI is similar to adhering to best practices in software protection.

Top Article for 2018 - Protecting Utilities

Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.

Addressing Remote Locations and Security with SD-WAN

Think of AR in an IIoT manufacturing context: now technicians with AR can remotely monitor, change and maintain systems without putting the operator in danger; however, AR requires a massive amount of network resources.

Imperiled SCADA Systems

Industrial Control, like many other systems, are vulnerable to insider attacks. However, they have the additional challenge that they are still largely based on technology from several decades ago, when systems were totally air-gapped from the rest of the world.

A Prescription for Trouble

In just the last 12-18 months, the culture and consequences of opioid drug use has supplanted internal theft, sexual harassment and other issues, emerging as the primary focus of most of the internal undercover investigations for manufacturing clients.

The ioTrust Security Solution

Manufacturers who can uniquely identify individual parts in a secure manner have an advantage over the competition, which is struggling to master this new concept. With ioTrust, manufacturers can associate their products with a secure, unique identity, that can extend through the supply chain.

Cybersecurity in the Factory

Technology for Industrial Control Systems and SCADA are now available that allow for continuous monitoring of these critical systems. A baseline is created and any deviations can be alerted and acted upon.

How Blockchain will Transform the Enterprise

With machine-to-machine communication, how does one validate "identities" and secure data at such massive scale.

Records 1 to 15 of 15

Featured Product

NORD Delivers Powerful, Reliable Drive Solutions for Demanding Packaging Applications

NORD Delivers Powerful, Reliable Drive Solutions for Demanding Packaging Applications

When you need quality, flexibility and high efficiency, NORD has you covered with complete drive solutions for primary and secondary packaging, end-of-line packaging, and higher-level applications. NORD supports you through the entire life cycle of your drive systems with pre-sales engineering support, online tools, and a global service network. Drive systems for both vertically and horizontally networked technology with all the options for sensor incorporation and integration into the higher-level control system.