Turbine Repair Firm Fills the Talent Gap June 30, 2021 CRT, a turbine repair firm, is working with Tooling U-SME to educate its workforce. With more than 300 different courses in machining and an extensive library available in welding and inspection, CRT is pleased with the breadth of content.
CMMC: Experts parse DoD’s new cybersecurity rules January 19, 2021 Current and prospective member companies of the defense industrial base (DIB) have watched with interest as the U.S. Department of Defense (DoD) developed its all-encompassing Cybersecurity Maturity Model Certification (CMMC) program.
Manufacturers Say Cybersecurity Threats Starting to Overwhelm Resources November 17, 2020 Most manufacturing executives participating in a survey said cybersecurity threats are beginning to overwhelm their resources.
NSK America Launches Latest Ultrasonic Polisher, The Sheenus Zero September 28, 2020 NSK America Corp. has upgraded its Ultrasonic Polisher with the Sheenus ZERO. Enhanced features of the Sheenus ZERO Ultrasonic Polisher include an improved, user-friendly design and high efficiency power, according to the company.
Supply Chains Present Cybersecurity Risks, Report Says September 23, 2020 Supply chains are creating cybersecurity risks for companies, according to a security services firm report.
Building a Future in Florida September 22, 2020 Florida's advanced manufacturing industries are diverse and include sectors producing intermediate and finished products ranging from plastics and micro-electronics to tortillas and motor vehicles.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
Mazak Joins CyManII as Collaborative Partner March 15, 2024 CyManII brings manufacturers and research institutions together to drive digital infrastructure and security for advanced manufacturing, supply chains and workforce development.
Companies are Building a Future in Florida January 26, 2021 Thanks in part to its pro-business policies, strong workforce, and trade infrastructure, Florida ranks among the nation’s top 10 states for manufacturing.
Free Cybersecurity Health Assessments for Michigan Manufacturers October 20, 2023 Elevate your cybersecurity preparedness with a free SensCy Score assessment.