BUSINESS > Production > Manufacturing


« Back to News

2019-10-23

Reduce Business Disruption - Make Cyber Security A Priority

Half of security experts in the manufacturing & utilities sectors surveyed say that their organisations don't invest enough in cyber security.

2019-05-14

Digital Techniques Drive Safety And Speed

Remote access technologies & robotics are eliminating human risk in hazardous heavy manufacturing and in designing training methods.

2019-03-19

Triton Malware Is Spreading

A highly sophisticated form of industrial malware capable of remotely disabling safety systems with potentially catastrophic consequences.

2018-12-03

AI Will Monitor 3D Printing

Lockheed Martin and the US Office of Naval Research are exploring how to apply AI to oversee and optimize 3-D printing of complex parts.

2018-12-10

PAS Global Named Leader In Industrial Control Systems Cyber Market

PAS Global named the Frost & Sullivan 2018 North American Technology Innovation Award winner for its ICS cybersecurity software.

2018-12-04

Selecting The Right SCADA Technology

Modern SCADA technologies offer choices that satisfy functionality and security requirements while improving performance for remote users.

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-23

Next-Gen Robotic Process Automation Leverages AI And Machine Learning

Kofax’s next-generation robotic process automation platform provides integrated AI, and ‘intuitive’ bot creation and management.

2018-11-21

Industrial Control Systems Are A Soft Target For Cyber Attackers

Improperly protected Internet-connected industrial control systems are vulnerable to attacks that can cause catastrophic harm.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

2018-11-06

US Homeland Security Warns Of Dangerous SCADA Flaw

ICS-CERT has warned organizations using Advantech’s ICS products to install an update that kills a remotely exploitable flaw.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.