Discovering the Keys to U.S. Manufacturing Recovery October 5, 2021 The COVID-19 pandemic clearly proved challenging to the manufacturing industry in myriad ways. Now, as nations and industries begin to navigate their way forward as restrictions are lifted, manufacturers have an opportunity to put into practice some lessons learned.
Manufacturers Say Cybersecurity Threats Starting to Overwhelm Resources November 17, 2020 Most manufacturing executives participating in a survey said cybersecurity threats are beginning to overwhelm their resources.
Building a Future in Florida September 22, 2020 Florida's advanced manufacturing industries are diverse and include sectors producing intermediate and finished products ranging from plastics and micro-electronics to tortillas and motor vehicles.
Supply Chains Present Cybersecurity Risks, Report Says September 23, 2020 Supply chains are creating cybersecurity risks for companies, according to a security services firm report.
Reducing Complexity in Assembly Equipment May 25, 2022 In this podcast, John Derry, senior application engineer at Promess, talks to SME Media contributing editor Michael Anderson about reducing complexity in assembly equipment. Derry discusses how assembly systems may become unnecessarily complex--and how that complexity can reduce quality and increase costs. Derry goes on to describe effective ways of addressing these issues and to reduce and even eliminate unnecessary complexity.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
How to Build a Robust Cybersecurity Strategy June 26, 2023 Combatting the growing cyber-threat landscape in manufacturing
Streamlining EV Battery Assembly Layout October 20, 2023 Uncover the story of how Eagle Technologies tackled a complex manufacturing assembly challenge with the help of Bosch Rexroth's MTpro design engineering tool.
Free Cybersecurity Health Assessments for Michigan Manufacturers October 20, 2023 Elevate your cybersecurity preparedness with a free SensCy Score assessment.