New Tool: ProSource
Checkout our packaging and processing solutions finder, ProSource.
Subscribe
Processing Equipment
Automation
Food Safety
Sustainability
Downloads
Search: Page 2
Article
Blog
Company
Document
Media Gallery
News
Page
Podcast
Product
Video
Webinar
Automation
Security
Beverage
Business Intelligence
COVID-19
Food Safety
Industry News
Manufacturing Innovation Award
PMMI News
Podcasts
Processing Equipment
Supplier News
Sustainability
Take Five
Webinars
Enter search phrase
Search
33 Results
Type: Article
Section: Automation > Security
Security
OpX Tool Seeks to Help Manufacturers with Remote Equipment Access
The OpX Leadership Network evaluates various approaches to ensuring safe and secure remote equipment access in plants.
February 6, 2020
Security
How Kellogg Manages Cybersecurity Risks in Manufacturing
Seeing the writing on the wall as Mondelēz and other global companies became collateral damage in ransomware attacks, Kellogg set out to create a cybersecurity strategy that would keep it out of the headlines.
January 9, 2020
Software
How serious are you about alarm management?
An Automation World reader survey detects a rising interest in alarm management best practices. It finds that, though many users are investing in new software, many are also missing the boat by giving their alarm philosophy short shrift.
October 2, 2019
Security
Focusing on Digital Plant Safety
Manufacturers and OEMs must understand that there are many sides to machine safety, including standards, regulations, functional requirements, technology, and even unforeseen circumstances.
October 2, 2019
IIoT
Understanding IoT cybersecurity risks
Deloitte and Dragos share the top threats to organizations and the need for a secure-by-design approach to the Internet of Things.
August 30, 2019
IIoT
Battle for Cybersecurity Spreads to Sensors
Even the lowest level of the Purdue model has become a target for hackers who want to attack manufacturing facilities. Automation vendors are scrambling to help users defend sensors and other intelligent devices.
August 29, 2019
IIoT
Manufacturers can make safety a profit center
Schneider Electric outlines how the soon-to-be-announced Safety Advisor technology, based on Triconex and EcoStruxure, will create a “profitable safety” business model.
January 8, 2019
Security
Seven-step cybersecurity checklist
Amid all the cybersecurity concerns and advice circulating throughout industry, a short checklist can be a good ongoing reference to make sure you're on track.
November 28, 2018
Security
Partnership combines cybersecurity with predictive maintenance
Bringing data analytics and artificial intelligence together for IT/OT insights, Atos and Nozomi Networks provide value whether deviations are caused by malicious or nonmalicious events.
September 5, 2018
Security
Russian attacks on U.S. industry continue
The Department of Homeland Security confirms that Russia-directed hackers continue to target industrial control systems in the United States.
August 14, 2018
Security
The assurance of cybersecurity insurance
It’s not enough to secure the borders of your business—because the hackers are getting in. Now, every manufacturer needs a response plan to a security breach.
July 23, 2018
Security
Cybersecurity incidents affect one-fourth of manufacturers polled
25% of manufacturers polled for "Collaboration That Works: Cybersecurity for Manufacturing" reported a cybersecurity incident in the past twelve months.
June 6, 2018
Security
Forty-seven percent of manufacturers polled said no cybersecurity attacks have taken place
Rebecca Taylor, National Center for Manufacturing Sciences, says this number is too low for two reasons—companies keep attacks a secret, and some don’t even know they have been subject to hacking.
May 29, 2018
Security
Achieving secure vendor access
PMMI's OpX Leadership Network brings together processors and equipment manufacturers to thwart threats to plant networks and machinery.
February 16, 2018
Security
Applying cyber situational awareness
A certified ethical hacker offers tips and tricks to protect yourself and your organization from cyber criminals lurking within the Internet.
June 16, 2017
Previous Page
Page 2 of 2