Your one-stop web resource providing safety and security information to manufacturers

Topics of the Day

Safeguarding OT from Cyber Threats

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

Read More
Loading
 

Sponsored by

Securing Digital Transformation

An Internet-enabled industrial CCTV system went live online not too long ago and in three short minutes the camera started to get malicious traffic requests. Think about it: One system placed on the massive Internet and it started getting attacks in three minutes.

Mindset Changing on Safety and Profitability

Safety systems continue working silently in the background, chugging along keeping a constant vigil over manufacturing operations to ensure everyone goes home safely at the end of the day.

Safety, Connectivity and IIoT

Increased connectivity across any manufacturing enterprise, from the oil and gas industry all the way to making buttons for a clothing line, has the potential to hike business intelligence, productivity and profitability.

Security: People as a Strength

It wasn’t that long ago when a German steel mill fell victim to a cyber attack that resulted in parts of the plant failing and a blast furnace workers could not shut down through normal methods.

How to Start a Security Program

Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.


Safety and Profitability

Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.


Making Time for Security

Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.


Breaking News

 

VIEWS

Forget Hyperbole: Stay True to Security Message

By Gregory Hale One of the good things that occurred after last week’s news from the Department of Homeland Security (DHS) involving Russian attackers being able to penetrate the networks of hundreds of U.S. utilities is the...

FOCAL POINTS

INCIDENTS

Aluminum Dust Collector Blaze at MI Plant

A fire broke out in an aluminum dust collector at the Dicastal North America plant in Greenville, MI, Tuesday, officials said. Firefighters and officers from the Greenville Department of Public Safety (GDPS) got the call at 1:04...

PRODUCTS AND SERVICES

Vanta Analyzer for Demanding Environments

The Vanta Element X-ray fluorescence (XRF) analyzer offers speed and ease of use in a variety of testing environments, including scrap recycling and metal manufacturing. Users can obtain clear material and grade ID in seconds...

GOVERNMENT

IoT Security Solution Gains DHS Funding

Bastille Networks, Inc. of Atlanta, Georgia earned a $199,680 grant to deliver its Internet of Things (IoT) security solution that will enable system administrators to gain real-time situational awareness of threats on connected...

TECHNOLOGY UPDATE

Security Only a Heartbeat Away

A thumbprint can unlock a door. An eye scan can unlatch a vault. Both good ideas that were once a futuristic though, but now used every day. In the future, however, releasing a lock of some sort may only be a heartbeat away....

TRAINING & CERTIFICATION

Cisco Earns Security Certification

Functional safety and cybersecurity certification provider, exida, certified Cisco System’s CSDL (Cisco Secure Development Lifecycle) engineering process for cybersecurity meets the requirements for IEC 62443. exida is a...

CAREERS

Developing Safer Mining Down Under

No one can deny mining is a dangerous occupation, but the University of Adelaide will lead a new national mining research and training center utilizing advanced technologies that will help to shape the future of Australia’s...

STANDARDS

TÜV Rheinland Expands Testing Scope

Occupational Safety and Health Administration (OSHA) expanded its scope of recognition for TÜV Rheinland of North America, Inc. as a Nationally Recognized Testing Laboratory (NRTL). Effective June 5, the expanded scope of...

RESEARCH

Inside Attack Fears on Rise: Report

It is one thing to suffer a cyber attack from a nation state or outside force, but more often than not, fears are growing about assaults coming from within, including rogue employees and vendors. The percentage of technology...

Industry Voices

  • By Ryan Brichant

    By Ryan Brichant “Disrupting” traditional business models might be hot talk for start-ups pitching investors, but in the world of manufacturing, transportation, energy and similar sectors, real “disruption” of production and facilities due to cyberatta …

  • By Neil Huntingdon

    By Neil Huntingdon Consumers are becoming increasingly concerned as technological advancements offer more convenience at the cost of our privacy. One particularly controversial innovation is facial recognition technology, which utilizes artificial inte …

  • By Stefan Liversidge

    By Stefan Liversidge Cyberattacks have been making the headlines daily, and the heat is on for critical infrastructure and other industrial organizations to do something about it. Building cyber resiliency at any speed puts a lot of pressure on an orga …

  • By Britta Voss

    When you email a friend, you don’t have to worry about whether they use Gmail, Outlook, Yahoo or some other email provider. You just enter their email address, write your message and hit send. The reason this works is because there are layers of standardized protocols all email clients have adopted so messages can seamlessly fly between users regardless of which client they choose.

Industry White Papers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network....

Pin It on Pinterest

Share This