BUSINESS > Production > Manufacturing


« Back to News

2021-07-27

Power Generation Systems Need Blockchain Security

The increasingly complex interaction among different power systems calls for a secure, efficient and robust cyber infrastructure using blockchain.

2021-06-16

Protecting Critical Infrastructure

Cyber attacks on critical infrastructure have a significant economic impact and securing these vital systems is all about controlling digital access.

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to respond.

2021-04-12

Industrial Control System Security Is Overlooked

Not My Job: Conventional IT-led network security often does not view control system devices and processes as their problem. By Joe Weiss

2021-02-16

Spotless Data

Manufacturers need accurate, reliable and clean data to run their processes. But what is data hygiene and how is it achieved? By Neil Ballinger

2020-12-23

The SolarWinds Hack Can Directly Affect Industrial Control Systems

Sophisticated Russian hackers compromised SolarWinds' Orion platform, taking over control of IT infrastrucure & industrial control systems.

2020-08-24

Industrial Robots Are Not Safe From Cyber Attack

Similar to remote working humans, when they are incorrectly set up and poorly secured, industrial robots can be a source of major security issues.

2020-06-10

Honda Hit By Ransomware

Automotive giant Honda is experiencing a company-wide network outage that is suspected to have been caused by a ransomware attack.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2019-10-23

Reduce Business Disruption - Make Cyber Security A Priority

Half of security experts in the manufacturing & utilities sectors surveyed say that their organisations don't invest enough in cyber security.

2019-05-14

Digital Techniques Drive Safety And Speed

Remote access technologies & robotics are eliminating human risk in hazardous heavy manufacturing and in designing training methods.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.