Grinding Roots August 22, 2013 Until the middle of 2010, first-tier subcontract machinist, JJ Churchill, could produce turbine blades only if they had their fir-tree root-forms preground elsewhere, or if they were subsequently added by another subcontractor. No longer is this the case.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
How to Build a Robust Cybersecurity Strategy June 26, 2023 Combatting the growing cyber-threat landscape in manufacturing
Brushing Up on Deburring and Finishing in Tight Spaces January 5, 2023 Space is usually at a premium for machine shops. Now, in addition to overall floor space limitations, CNC machines and other equipment are becoming increasingly sophisticated and smaller, which can create new challenges.
Advanced Rotary Grinders Deliver Tighter Tolerances October 23, 2023 Dive into the future of ceramic grinding with advanced rotary grinders. These automated marvels are changing the game, offering precision, efficiency, and ease of use, even for less experienced operators. Say goodbye to the challenges of grinding ceramics and hello to a more productive and accessible world.
Free Cybersecurity Health Assessments for Michigan Manufacturers October 20, 2023 Elevate your cybersecurity preparedness with a free SensCy Score assessment.
Top 3 Cyber Threats Defined February 13, 2023 Best practices to combat ransomware, phishing attacks, and supply chain threats
Defending the IoT/OT Attack Surface February 8, 2023 Understand the risks and protect against IoT/OT devices being breached
Industry Priorities for 2023 February 8, 2023 Investments in technology, workforce key for a resilient manufacturing ecosystem