Cybersecurity to Improve Profitability
· ICS Security

Cybersecurity to Improve Profitability

Cybersecurity has financial benefits, offers product differentiation, and smooths out the patching processes both for product manufacturers and their customers. The importance of cyber defense will go up over time. Cyber defense and security for embedded systems is justified using a total cost of ownership approach, as quantifying economic benefits will help justify faster adoption. […]

Read more →
Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software
· Cybersecurity

Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software

Current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. Recent research by RunSafe Security partners show that current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. When measured against NIST CVEs (Common Vulnerability Enumerations from the National Vulnerability Database), […]

Read more →
Top 10 AI Use Cases for Industrial Operations
· Artificial Intelligence

Top 10 AI Use Cases for Industrial Operations

Gartner believes that by 2022, 85% of AI projects will fail. One of the key reasons for this high failure rate is that often the use case being applied has not been through a rigorous selection process and the following considerations are overlooked. For example, is the AI use case:  Based on an operational challenge that […]

Read more →
eBook: Manufacturing Cybersecurity Case Studies
· Cybersecurity

eBook: Manufacturing Cybersecurity Case Studies

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several issues within smart factory security, namely with difficult-to-eliminate vulnerabilities, the spread of malware, and flat network configurations. Furthermore, when […]

Read more →
[White Paper] The low-code digital transformation guide
· Connected Industry

[White Paper] The low-code digital transformation guide

The world is changing and the way you develop software needs to change with it. The key? Your entire organization. Start breaking down walls to clear space for your innovation factory. When we began our journey, we wanted to solve a problem that you and countless other businesses face every single day: delivering software with […]

Read more →
How to Put IoT Into Action
· Connected Industry

How to Put IoT Into Action

IoT has dominated the technology discussion in recent years, inspiring the imagination of the media, politics and the economy. While there was a lot of talk of possibilities and use case scenarios during this time, many companies are still struggling with the implementation. On the whole, companies can work more productively, more cost-effectively and more […]

Read more →
Steps to Decarbonization in the Energy Industry
· Energy

Steps to Decarbonization in the Energy Industry

[vc_row][vc_column][vc_column_text] In the last 12 months, Uniper has invested in rotating grid stabilization technology in its Killingholme plant in the UK, supplied by technology partner Siemens. This innovation will enable Uniper to provide vital grid stability services to National Grid ESO without the need to generate power – a first step towards its carbon neutral […]

Read more →
Artificial Intelligence and Edge Computing in Manufacturing
· Artificial Intelligence

Artificial Intelligence and Edge Computing in Manufacturing

We’ve all heard a lot about Artificial Intelligence (AI) and its crucial role in empowering key elements of the “Factory of the Future”. And future Edge Computing is changing the way we think about what kind of digital performance can be achieved from devices at the edge of powerful 5G networks. But what happens when […]

Read more →
Accelerating IIoT Initiatives Through an Ecosystem Approach
· Smart Manufacturing

Accelerating IIoT Initiatives Through an Ecosystem Approach

IIoT initiatives can be major projects involving millions in custom development and integrations, years of work, and collaboration across all levels and departments of an organization. However, the result of such an approach is often a large, bulky, difficult-to-implement IoT “initiative” with no actionable use cases to speak of. Aside from the typically high failure rate of these IIoT projects, an unprecedented pandemic only exacerbated the problem. The question this begs asking: Why invest in digital transformation initiatives at the corporate level when you still don’t have usable data from the factory floor?

Read more →
White Paper: The State of Industrial Cybersecurity
· Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time. There were inconsistencies in technology and environment, and also in people and processes. This survey provides insight into the […]

Read more →
Digital Transformation for End-to-End Visibility in the Energy Industry
· Energy

Digital Transformation for End-to-End Visibility in the Energy Industry

One of the fundamental qualifications for digital transformation is the connectivity of devices and assets such as controllers, machines, products and even the operators along the entire value chain. Industries are building networks of seamlessly connected digital systems, and controlling and monitoring them over distributed control systems. Digital Transformation for Visibility into Operations With digital […]

Read more →
A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned
· ICS Security

A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned

A SolarWinds-style cyberattack happened back in in 2013-14 that affected big government agencies and thousands of companies. What should we have learned from the Dragonfly/HAVEX attack? Software Infiltration A cyberattack group called Dragonfly attacked power plants and industrial sites, employing a very similar tactic to SolarWinds. “The technique of injecting into a supply chain is […]

Read more →