ProFood World
  • Subscribe
  • Processing Equipment
  • Automation
  • Food Safety
  • Newsletters
  • Machine Tours
Topics
  • Processing Equipment
  • Automation
  • Food Safety
Resources
  • Events
  • Downloads
  • Newsletters
  • Magazine
  • Leaders in Processing
  • Videos
  • Podcasts
  • Webinars
  • OpX Leadership Network
  • Sustainability Awards
  • Manufacturing Awards
User Tools
  • Subscribe
  • Advertise
  • Reprints
  • About
  • Contact
  • Privacy
  • Terms of Use
  • Advertising Terms & Conditions
Twitter iconFacebook iconLinkedIn iconYouTube icon
Technology makes manufacturing more efficient, but also creates vulnerabilities.
Security
Hackers Shift Focus to Packaging and Processing
Pervasive new technology increases entry points for cyber attacks. Discover cybersecurity solutions at PACK EXPO International (Oct. 23-26; McCormick Place, Chicago).
Sean Riley
May 11th, 2022
Cisa Logo 1920x1080
Security
New Industrial Control System Security Threat
David Greenfield
Apr 14th, 2022
Don’t be the Reason your Company is Attacked
Security
unPACKed with PMMI Podcast: The Cybersecurity Frontlines
Sean Riley
Mar 18th, 2022
Aaron 082720 Web
Security
Don’t Get Caught Without a Cybersecurity Plan
Aaron Hand
Mar 16th, 2022
Getty Images 104205851
Security
Why You Should Be Concerned About Ransomware
David Greenfield
Mar 2nd, 2022
Cybersecurity
Take Five
Why Proper Cybersecurity Is Critical to Food and Bev Operations
Recent attacks have made it clear how imperative cybersecurity is to the food and beverage industry and to the entire supply chain. It’s also important to keep your operations up and running, and making money.
Aaron Hand
Feb 25th, 2022
Cybersecurity Web
Security
Put Your Cyber Defenses Up Before They Take You Down
As cyber attacks escalate, the food and beverage sector eyes a fresh course of action to safeguard operations and prevent disruptions to the supply chain.
Beth Stackpole
Feb 1st, 2022
Your recipe, automated to perfection
Sponsored
Your recipe, automated to perfection
Whether it's storing, sifting, metering, weighing or transferring, Shick Esteve is your complete flour reclaim and ingredient automation systems provider.
May 1st, 2022
OEMs should keep cybersecurity top of mind in their business, carefully monitor their own products in the market to ensure their ongoing security, and strictly regulate the devices they use for external work.
Security
OEMs Play Larger Role in Manufacturing Industry Cybersecurity
Since OEMs also serve manufacturing clients who are themselves vulnerable to cyberattack, there are a few extra considerations to be aware of with regard to cybersecurity.
Kim Overstreet
May 18th, 2021
To get better cybersecurity results, companies have started creating dedicated departments or teams within the IT department that are responsible for cybersecurity.
Security
Personnel Training: A Critical Third Step in Cybersecurity
The best cybersecurity plan is only as good as the individuals tasked with carrying it out.
Kim Overstreet
May 11th, 2021
Network Management: The Second Step to Increasing Cybersecurity
Security
Network Management: The Second Step to Increasing Cybersecurity
After a thorough operations analysis, securing networks is the next step to addressing security gaps and lapses.
Kim Overstreet
May 5th, 2021
The First Step to Increasing Cybersecurity is to Analyze Operational Vulnerabilities.
Security
The First Step to Increasing Cybersecurity
There are a number of straightforward and understandable steps companies can take to protect their operations from cyberattacks. The first is to analyze operational vulnerabilities.
Kim Overstreet
Apr 27th, 2021
Getty Images 802570756
Security
Preventing Internal Cyberattacks Could Save Companies Millions
Cyberattacks in the U.S. have the highest cost of any global nation, with an average cost of $8.64 million per occurrence for companies suffering an attack.
Kim Overstreet
Apr 20th, 2021
Getty Images 869287090
Security
Two Key Areas of Cybersecurity Vulnerability in Manufacturing
By better understanding operational weaknesses, manufacturers can guard against future threats. Read about two key areas that require assessment.
Kim Overstreet
Apr 13th, 2021
The difference between IT and OT cybersecurity attacks.
Security
Cybersecurity 101: The Difference Between IT and OT Attacks
There are two categories of cyberattacks, but they can create a bridge to one another, creating a potential avenue for cybercriminals to access the organization.
Kim Overstreet
Apr 6th, 2021
Critical components need to be assessed to achieve a robust cybersecurity system.
Security
Manufacturing Cybersecurity: Critical Components for Risk Assessment
By the second quarter of 2020, cyberattacks targeting manufacturers accounted for 33% of all incidents across all industries with losses totaling hundreds of millions of dollars. Small businesses are also at risk.
Kim Overstreet
Mar 28th, 2021
K7ww Ouf5 1920 6026f308c8a5c
Security
Automation Trends in Food Processing and Packaging: Remote Access
Watch part two of this three-part series on top automation trends impacting food processing and packaging today.
David Greenfield
Feb 12th, 2021
A sophisticated system allows Smucker to add pack sizes without major impacts to the line.
Automation
Fast-Track Fulfillment of a Frozen Food Favorite
Now better positioned to keep up with yearly double-digit growth of its popular Uncrustables line, The J. M. Smucker Company creates a highly automated facility that boasts the largest single baking line in the world.
Joyce Fassl
Jun 5th, 2020
Awgyq Aweb
Security
Ensuring Mobile Device Safety and Security for Industrial Use
In this episode of the "Automation World Gets Your Questions Answered" podcast series, we connect with David Hoysan of Phoenix Contact to understand how manufacturing and processing companies should address the safety and security of mobile devices.
Apr 15th, 2020
Remote Equipment Access infographic
Security
OpX Tool Seeks to Help Manufacturers with Remote Equipment Access
The OpX Leadership Network evaluates various approaches to ensuring safe and secure remote equipment access in plants.
Feb 6th, 2020
Jim Tassell, senior IT security architect for Kellogg, presents the food maker’s cybersecurity journey at the Automation Fair’s Food and Beverage Forum.
Security
How Kellogg Manages Cybersecurity Risks in Manufacturing
Seeing the writing on the wall as Mondelēz and other global companies became collateral damage in ransomware attacks, Kellogg set out to create a cybersecurity strategy that would keep it out of the headlines.
Aaron Hand
Jan 9th, 2020
Panelists discuss cybersecurity during Schneider Electric's Innovation Days in Austin.
Security
Certification Emphasizes Cybersecurity of Schneider Electric’s Processes
TÜV Rheinland has certified the automation supplier’s Secure Development Lifecycle process to ISA/IEC 62443-4-1 cybersecurity standards. This was a highlight to this week’s Triconex and Foxboro user group meetings in Austin.
Aaron Hand
Oct 25th, 2019
ProFood World
Twitter iconFacebook iconLinkedIn iconYouTube icon
  • Advertise
  • About
  • Contact
  • Privacy
  • Terms of Use
  • Advertising Terms & Conditions
  • Site Map
© 2022 PMMI Media Group. All rights reserved.