BUSINESS > Production > Manufacturing


« Back to News

2018-12-04

Selecting The Right SCADA Technology

Modern SCADA technologies offer choices that satisfy functionality and security requirements while improving performance for remote users.

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-23

Next-Gen Robotic Process Automation Leverages AI And Machine Learning

Kofax’s next-generation robotic process automation platform provides integrated AI, and ‘intuitive’ bot creation and management.

2018-11-21

Industrial Control Systems Are A Soft Target For Cyber Attackers

Improperly protected Internet-connected industrial control systems are vulnerable to attacks that can cause catastrophic harm.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

2018-11-06

US Homeland Security Warns Of Dangerous SCADA Flaw

ICS-CERT has warned organizations using Advantech’s ICS products to install an update that kills a remotely exploitable flaw.

2018-11-05

Blockchain Can Improve Manufacturing

Blockchain’s greatest potential to deliver business value is in manufacturing.

2018-09-24

Manufacturing Industry: A Key Target For Cyber Attackers

As manufacturing industry is becoming better connected, the frequency and sophistication of cyber attacks is going up.

2018-06-20

With Robots In Control, Chemical Makers Fight For Formula Ownership

Industrial robots are absorbing huge quantities of sensitive data from both manufacturers and customers, modifying key formulations as they go.

2018-02-28

Corporate Defence Plan Against Cyberattacks

Major industrial companies are joining up to promote stronger safeguards against assaults on digital systems that control critical infrastructure.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Opus

Opus

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Oktacron

Oktacron

Oktacron is a company specialized in cybersecurity, guided by the principle that at every moment, in every approach, and with all technologies, one should stay one step ahead of attackers.