Your one-stop web resource providing safety and security information to manufacturers

Topics of the Day

Safeguarding OT from Cyber Threats

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

Read More

Going Digital

Smarter, Connected Networks Add Complexity, but Plant Floor Can’t be an Island Anymore A smart,...

Read More

Sponsored by

Securing Digital Transformation

An Internet-enabled industrial CCTV system went live online not too long ago and in three short minutes the camera started to get malicious traffic requests. Think about it: One system placed on the massive Internet and it started getting attacks in three minutes.

Mindset Changing on Safety and Profitability

Safety systems continue working silently in the background, chugging along keeping a constant vigil over manufacturing operations to ensure everyone goes home safely at the end of the day.

Safety, Connectivity and IIoT

Increased connectivity across any manufacturing enterprise, from the oil and gas industry all the way to making buttons for a clothing line, has the potential to hike business intelligence, productivity and profitability.

Security: People as a Strength

It wasn’t that long ago when a German steel mill fell victim to a cyber attack that resulted in parts of the plant failing and a blast furnace workers could not shut down through normal methods.

How to Start a Security Program

Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.

Safety and Profitability

Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.

Making Time for Security

Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.

Breaking News



Forget Hyperbole: Stay True to Security Message

By Gregory Hale One of the good things that occurred after last week’s news from the Department of Homeland Security (DHS) involving Russian attackers being able to penetrate the networks of hundreds of U.S. utilities is the...



Adobe Clears Vulnerabilities in Flash

Adobe issued its September patches and among the vulnerabilities it cleared were three issues in Flash Player. One was Adobe Flash Player Desktop Runtime running and earlier. The second was Adobe Flash Player for...


Strategic Program Launches to Stimulate IIoT

The Industrial Internet Consortium (IIC) launched a new program designed to stimulate IIoT adoption across the industry to help IT and OT users solve problems they face in their businesses. The IIC Accelerator Program includes...


Safety Alliance Inked for PA Workers

A two-year alliance was signed with the Pennsylvania Occupational Safety and Health Administration (OSHA) Consultation Program at Indiana University of Pennsylvania, and the Pennsylvania Department of Labor and Industry’s...


Mobile Technologies Locate Methane Leaks Faster

On trucks, drones and airplanes, 10 promising technologies for finding natural gas leaks swiftly and cheaply competed in the Mobile Monitoring Challenge, the first independent assessment of moving gas leak detectors at well...


Mine Safety Grants Awarded

In a move to support education and training to help identify, avoid and prevent unsafe working conditions in and around the nation’s mines, $400,000 in funding was awarded through the Brookwood-Sago grant program. The...


Developing Safer Mining Down Under

No one can deny mining is a dangerous occupation, but the University of Adelaide will lead a new national mining research and training center utilizing advanced technologies that will help to shape the future of Australia’s...


TÜV Rheinland Expands Testing Scope

Occupational Safety and Health Administration (OSHA) expanded its scope of recognition for TÜV Rheinland of North America, Inc. as a Nationally Recognized Testing Laboratory (NRTL). Effective June 5, the expanded scope of...


Small Businesses Feel Brunt of Breaches

Small businesses are not immune to cyber attacks as 36 percent of them have been victims of data breaches so far in 2019, a new report found. While data breaches remain an area of concern for businesses of all sizes, the survey...

Industry Voices

  • By Neil Huntingdon

    By Neil Huntingdon Consumers are becoming increasingly concerned as technological advancements offer more convenience at the cost of our privacy. One particularly controversial innovation is facial recognition technology, which utilizes artificial inte …

  • By Stefan Liversidge

    By Stefan Liversidge Cyberattacks have been making the headlines daily, and the heat is on for critical infrastructure and other industrial organizations to do something about it. Building cyber resiliency at any speed puts a lot of pressure on an orga …

  • By Britta Voss

    When you email a friend, you don’t have to worry about whether they use Gmail, Outlook, Yahoo or some other email provider. You just enter their email address, write your message and hit send. The reason this works is because there are layers of standardized protocols all email clients have adopted so messages can seamlessly fly between users regardless of which client they choose.

  • By Lynn Wood

    It’s no surprise that due to the nature of their industry, manufacturing facility leaders have invested a significant amount in the equipment necessary to accomplish streamlined operations and achieve their goals.

Industry White Papers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network....

Pin It on Pinterest

Share This