Using Data to Deliver Results June 19, 2023 There’s much more to leveraging production data than its capture and analysis; there’s also integration with the company’s other software systems and the strategic perspective that results.
CMMC 2.0 Update; 5 Basic Steps for Cybersecurity August 1, 2022 The structure of CMMC 2.0 has been streamlined to be slightly less stringent and easier to implement, especially for shops in the lower tiers of the supply chain.
Safe & Secure? July 27, 2022 Black hats, script kiddies, phishers, and hostile nation-states. Bad actors are out there, fervently working to sabotage your factory and steal your stuff. What are you doing about it?
Smart Planning for Future Success July 21, 2022 In today’s ever-changing environment, planning—and investing in next-generation solutions—is more critical than ever.
Mazak’s New MPower Support Program August 23, 2021 New program empowers manufacturers through customer care for the life of their machines
Energy Industry Demands New Mix of Parts November 29, 2021 While fossil fuels dominate the energy market, expect a new mix of parts as renewable energy and EVs grow in market share.
Bay County, FL receives Foreign Direct Investment Certification January 7, 2022 Bay County received a welcomed award at the September 21st Commission meeting.
E-mobility Increases Issues for Leak Detection August 5, 2021 Today’s rapid and unexpected growth in the production of vehicles with alternative drive systems is giving carmakers and their manufacturing partners a wide range of leak-detection challenges to ensure vehicle quality.
Proactive OT Security—Protecting Before The Attack January 27, 2021 Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.
Driving Cultural Change in Manufacturing Cybersecurity July 27, 2022 As hackers become more sophisticated and dangerous, manufacturers need to step up their cybersecurity efforts.