Protecting IT and OT Resources Against Advanced Threats in Manufacturing
· Connected Industry

Protecting IT and OT Resources Against Advanced Threats in Manufacturing

Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical safety, and in some cases, national security. Companies strive to secure their systems while maintaining business imperatives like operational […]

Read more →
Digital Transformation of an Energy Plant
· Energy

Digital Transformation of an Energy Plant

Located in Flintshire, North Wales, Connah’s Quay rests on the south bank of the River Dee. The current gas-fired power station was commissioned in 1996, although electricity generation activities have been operated on the land as far back as 1954, when it was originally home to a coal-fired plant. The changes the site has seen […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
Digital Transformation Case Studies – Part 2
· Industrial IoT

Digital Transformation Case Studies – Part 2

Note: Part 1 of Digital Transformation Case Studies can be found here. Case Study #3: Tastitalia connects a different kind of industrial machine to the Internet of Things   Tastitalia, an Italian company that creates customized solutions for human-machine interfaces, managed to control production costs and quality levels of their processes in an extremely precise and continuous […]

Read more →
2020 Annual Cybersecurity Report
· ICS Security

2020 Annual Cybersecurity Report

Looking back at a most unprecedented year, Trend Micro’s Annual cybersecurity Report surveys the most notable and crucial security concerns that emerged and persisted in 2020, and provides users and organizations with insights into how they can navigate a drastically changing threat landscape.  One of the areas of concern is supply chains. Cybersecurity Threats on Supply Chains […]

Read more →
Picking a path: build versus buy
· Connected Industry

Picking a path: build versus buy

Every organization in our digital world has to determine whether it is better to buy commercial off-the-shelf (COTS) software or build software that directly meets their needs. For over 20 years, the argument has strongly favored buy. Historically, COTS has had several advantages: faster time-tomarket, lower engineering costs, lower risk and immediate deployment for use. […]

Read more →
More Interoperability in the IIoT
· Connected Industry

More Interoperability in the IIoT

Why the manufacturing industry needs communication standardsThe digital transformation has been underway on factory floors for some time now. As digital technologies emerges as a key factor for remaining competitive, the need for change gains focus. The sheer complexity of many existing systems makes data transparency and networking difficult and highlights why the production industry […]

Read more →
Digital Transformation Case Studies
· Connected Industry

Digital Transformation Case Studies

The manufacturing industry has been adopting next-gen technologies such as AI (artificial intelligence), advanced data analytics, predictive maintenance, automation, robotics, and more for improved productivity and enhanced safety on factory floors. Cutting-edge technologies can hold the key to optimizing uptime and productivity. Below are two digital transgormation case studies on manufacturers who implemented transformative technologies.  […]

Read more →
Security Risks Are Slowing IT-OT Convergence
· Cybersecurity

Security Risks Are Slowing IT-OT Convergence

Fortinet has worked with Forrester Consulting for a third time to check in on security trends affecting those who manage and maintain critical infrastructure—including the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that manage everything from factories to refineries to telecommunications infrastructure. Based on a global survey, the report identifies […]

Read more →
[White Paper] Ten Principles for Building Safe Embedded Software Systems
· Connected Industry

[White Paper] Ten Principles for Building Safe Embedded Software Systems

Obtaining safety certifications and pre-market approvals for safety-related systems is arduous, costly, and prone to failure. And yet, such certifications and approvals are integral to the sale and market acceptance of software for a wide range of products. For example, software for a medical device must obtain FDA Class III pre-market approval (IEC 62304), a […]

Read more →
How to Increase Profitability in Manufacturing using Machine Learning
· Artificial Intelligence & ML

How to Increase Profitability in Manufacturing using Machine Learning

The Internet of Things (IoT) is creating a new dynamic in the industrial space, specifically manufacturing. Large manufacturing companies are moving to leverage IoT technologies and predictive analytics as a part of increasing profitability and staying competitive. In the U.S. alone, existing capital stock worth over $6.8 trillion dollars is being fitted with sensors to […]

Read more →
The Immune System Approach – Cyber AI for Industrial Control Systems
· Cybersecurity

The Immune System Approach – Cyber AI for Industrial Control Systems

The practice of cyber security has changed dramatically in the past few years, presenting a significant challenge to management teams across all industries and business domains. As IT security teams become accountable for securing Operational Technology (OT) and OT-specialist teams similarly inherit responsibility for traditional IT security, this technical convergence requires the synergy of both […]

Read more →