Bay County, FL receives Foreign Direct Investment Certification January 7, 2022 Bay County received a welcomed award at the September 21st Commission meeting.
CMMC: Experts parse DoD’s new cybersecurity rules January 19, 2021 Current and prospective member companies of the defense industrial base (DIB) have watched with interest as the U.S. Department of Defense (DoD) developed its all-encompassing Cybersecurity Maturity Model Certification (CMMC) program.
Smart Planning for Future Success July 21, 2022 In today’s ever-changing environment, planning—and investing in next-generation solutions—is more critical than ever.
CMMC 2.0 Update; 5 Basic Steps for Cybersecurity August 1, 2022 The structure of CMMC 2.0 has been streamlined to be slightly less stringent and easier to implement, especially for shops in the lower tiers of the supply chain.
Discovering the Keys to U.S. Manufacturing Recovery October 5, 2021 The COVID-19 pandemic clearly proved challenging to the manufacturing industry in myriad ways. Now, as nations and industries begin to navigate their way forward as restrictions are lifted, manufacturers have an opportunity to put into practice some lessons learned.
Manufacturers Say Cybersecurity Threats Starting to Overwhelm Resources November 17, 2020 Most manufacturing executives participating in a survey said cybersecurity threats are beginning to overwhelm their resources.
Supply Chains Present Cybersecurity Risks, Report Says September 23, 2020 Supply chains are creating cybersecurity risks for companies, according to a security services firm report.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
How to Build a Robust Cybersecurity Strategy June 26, 2023 Combatting the growing cyber-threat landscape in manufacturing
Free Cybersecurity Health Assessments for Michigan Manufacturers October 20, 2023 Elevate your cybersecurity preparedness with a free SensCy Score assessment.