Cool and Interesting Things June 22, 2023 For three decades, Darin Gray has spent his days teaching young people to share ideas, learn cool stuff, and above all, make a difference
Using Data to Deliver Results June 19, 2023 There’s much more to leveraging production data than its capture and analysis; there’s also integration with the company’s other software systems and the strategic perspective that results.
Let’s Get Wired! April 7, 2023 Visibility, uptime, profits, and part quality: why a networked manufacturing floor is no longer a nice-to-have
The Press Shop of the Future Starts Today March 2, 2023 Schuler North America showcased its Digital Suite product family for the Press Shop of the Future during the grand opening of its new service facility in Canton, Mich.
As Smart Factory Security Improves… Vigilance is Key February 14, 2023 Proliferation of cyber threats puts manufacturers at risk
Manufactured Disruption: Securing Cyber-Physical Systems February 10, 2023 Manufacturers need to adopt proactive threat modeling for their cyber-physical systems to map the connections between IT and OT.
Navigating Cybersecurity Maturity Model Certification (CMMC) 2.0 February 9, 2023 DoD steps up cyber safety rules for suppliers
Where Innovative Manufacturers Forge the Future: MxD November 7, 2022 MxD equips U.S. manufacturers with digital tools and expertise to help build every part better
CMMC 2.0 Update; 5 Basic Steps for Cybersecurity August 1, 2022 The structure of CMMC 2.0 has been streamlined to be slightly less stringent and easier to implement, especially for shops in the lower tiers of the supply chain.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.