Feb. 19, 2017 - Rockwell Automation and Claroty, an industrial security software provider, will work together to combine their security products and services into future, packaged security offerings.
Feb. 17, 2017 - A year after IBM began teaching its Watson computer system to fight cybercrime, the company is making the platform available for use.
Jan. 17, 2017 - The University of New Brunswick opened a new cybersecurity institute in hopes of establishing an educational hub for one of the most pressing issues in the information age.
Dec. 16, 2016 - Together with the National Emergency Supply Agency and the private sector, VTT Technical Research Centre of Finland says it has developed tailored solutions bringing “improved cybersecurity and disruption-free operations” to manufacturers. The results of the now ending KYBER-TEO project will make companies more able to ward off possible cyber threats.
Dec. 1, 2016 - In 2000, analyst firm Frost & Sullivan coined a term to describe the growth of integrating machines used in industrial settings with Internet-connected sensors and software that collect and examine data from machines and then apply it to operations to improve efficiencies — the Industrial Internet.
Jul. 4, 2016 - Tripwire recently announced its Configuration Compliance Manager (CCM) now supports ANSI/ISA-62443, a global standard for securing industrial automation systems, controllers, and associated networking equipment configurations.
Apr. 4, 2016 - Wurldtech, a GE company and provider of cybersecurity solutions for operational technology (OT) and critical infrastructure, announced today a new GE Digital security offering: industrial managed security services provider (iMSS). According to the company, these services are designed to help customers strengthen their security posture by providing real-time visibility, threat detection and remediation within their OT network environment.
Jan. 19, 2016 - Factories are poised to capture more value from the Internet of Things (IoT) than any other setting in the next 10 years.
Dec. 2, 2015 - Are you working securely? Cybersecurity is a hot-button issue these days and while it’s been commonly noted that manufacturing companies must be proactive in protecting themselves, some organizations may not know where to begin. For insight on how businesses can get started, Manufacturing AUTOMATION spoke to John DiMaria, senior product manager of systems certification for BSI Americas, to get his take on what businesses should keep in mind when implementing a cybersecurity plan.
Nov. 23, 2015 - As industrial markets evolve to unlock the promise of the Internet of Things (IoT), Rockwell Automation and Cisco say they have announced new additions to their Converged Plantwide Ethernet (CPwE) architectures to help operations technology (OT) and information technology (IT) professionals address constantly changing security practices.
Oct. 29, 2015 - For every manufacturing firm, sensitive data is the most valuable asset. If this critical information – in particular, intellectual property (IP) – is lost or stolen, manufacturers not only face significant fines and penalties, but also suffer a hit to their reputations and public trust. Most importantly, they risk losing their competitive advantage, which can lead to business failure.
Apr. 14, 2015 - Several months ago, Borden Ladner Gervais LLP released its annual Top Ten Business Risks round-up with cyber risks topping the list for 2015. The Toronto, Ont.-based law firm noted that “even as organizations invest millions to protect their data, the question is unfortunately when and not if it will happen” — but why is that exactly? How can BLG be so sure all organizations are at risk? Manufacturing AUTOMATION chatted with Ira Nishisato, partner, Commercial Litigation Group, to find out why cybersecurity must be seen as a problem for the entire organization, not just the IT department.
Sept. 29, 2014 - The migration from traditionally isolated, purpose-built industrial control systems (ICS) to more modern IT infrastructures continues to be embraced by asset owners. However, modern IT can also bring previously unseen cybersecurity issues. More importantly, the operational requirements of control systems can create unintentional vulnerabilities that cannot be mitigated using contemporary security methods. All of these factors combine to create complexity in addressing cybersecurity risks in ICS environments.
Automate/Promat 2017Mon Apr 03, 2017
Siemens Innovation Tour 2017 - EdmontonThu Apr 06, 2017
Hannover Messe 2017Mon Apr 24, 2017
UKIVA Machine Vision Conference 2017Thu Apr 27, 2017
Partners in Prevention 2017Tue May 02, 2017