OT Threats Are on the Rise. Are You Prepared?
· Cybersecurity

OT Threats Are on the Rise. Are You Prepared?

For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. But the reality is that most citizens don’t think about these systems until there’s a problem. That’s why the attack against Colonial Pipeline in May 2021 was so startling. The attack on a segment of the enterprise transcended […]

Read more
What Is a SOC? Top Security Operations Center Challenges
· Cybersecurity

What Is a SOC? Top Security Operations Center Challenges

What Is a Security Operations Center (SOC)? A security operations center (SOC) is a critical component of a threat containment plan to protect your business. According to a recent study, having a SOC improves your organization’s ability to contain any threats by 43%. However, first, you must familiarize yourself with the most common challenges SOCs […]

Read more
Driving America’s Businesses Forward with Proactive ESG Strategies at the Forefront
· Connected Industry

Driving America’s Businesses Forward with Proactive ESG Strategies at the Forefront

Entering the new millennium, few companies across all industries had a watchful eye toward environmental stewardship, particularly throughout the heavy-duty truck transportation industries. However, just a few short years later, governments in many countries began to better understand the benefits that could come from corporations curbing their carbon emissions output, and new greenhouse gas mandates […]

Read more
IoT vs. IIoT
· Connected Industry

IoT vs. IIoT

The IoT world is a big world that everybody is talking about. IoT products nowadays come in different forms — some are labelled as IoT, but in fact they represent only a small portion of what an IoT product really entails. A fully fledged IoT project not only requires programming and hardware expertise but also […]

Read more
Neural networks, types and applications
· Artificial Intelligence

Neural networks, types and applications

Deep Learning, which is based on the use of neural networks, can be applied to very different types of information, which call for the use of particular networks better suited to achieving specific objectives. What are Artificial Neural Networks (ANN)? The Artificial Neural Networks (ANN), on which Deep Learning is based, are computational models that […]

Read more
The Industrial Metaverse is Coming. Are you ready?
· Connected Industry

The Industrial Metaverse is Coming. Are you ready?

Right now, many of us are already tired of hearing the words metaverse and industrial metavrerse. It’s being tossed around like the words Internet and eCommerce were in the 1990s. Back then, many of us had no idea about the impact that the Internet and a new way of buying and selling would have on […]

Read more
Top February 2022 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

Top February 2022 Industrial IoT & ICS Cybersecurity Events

Welcome to the second month of 2022! February may be the shortest month of the year but it doesn’t mean we are short on events. This month, we’ve curated the list, with the timeline of major events that is happening in February around the globe, in-person or online, and what’s in it for the IIoT […]

Read more
Climate Action: Carbon Capture in perspective
· Energy

Climate Action: Carbon Capture in perspective

Worldwide global warming is a serious topic of worldwide significance which is the subject of planned US and other mitigating legislative initiatives. From that perspective, carbon capture and store technologies (CCS) becomes an increasingly important means of reducing carbon dioxide (CO2) emissions from the atmosphere over the previous decade as the main climate-related greenhouse gas. […]

Read more
How to Protect Deployed Assets from Log4j
· Cybersecurity

How to Protect Deployed Assets from Log4j

What Is the Log4j Exploit Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the CVE-2021-4428  vulnerability in Apache Foundation’s Log4j software is no different. Also known as the Log4Shell vulnerability, it is present within the log4j-core library commonly used for logging in Java applications. These […]

Read more
Spotlight On Colors: Why is Blue Hydrogen so Important?
· Energy

Spotlight On Colors: Why is Blue Hydrogen so Important?

Could you please explain briefly what blue hydrogen is? Wietfeld: People worldwide view hydrogen as key energy carrier for decarbonizing the economy. Why? Because the only by-product of hydrogen combustion is water. Unfortunately, there’s isn’t enough naturally occurring hydrogen; so it must be produced. Until now, this has been done with fossil fuels, mostly natural […]

Read more
How to Reduce Tool Failure with CNC Tool Breakage Detection
· Connected Industry

How to Reduce Tool Failure with CNC Tool Breakage Detection

Tool breakage has always been a challenge for machining operations. These breaks can occur during regular machining cycles due to tool wear that eventually results in failure. They may also occur due to improper settings, human error, equipment malfunction, or for a variety of other reasons. When tools break, costs pile up. Downtime means fewer […]

Read more