BUSINESS > Production > Manufacturing


« Back to News

2018-11-23

Next-Gen Robotic Process Automation Leverages AI And Machine Learning

Kofax’s next-generation robotic process automation platform provides integrated AI, and ‘intuitive’ bot creation and management.

2018-11-21

Industrial Control Systems Are A Soft Target For Cyber Attackers

Improperly protected Internet-connected industrial control systems are vulnerable to attacks that can cause catastrophic harm.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

2018-11-06

US Homeland Security Warns Of Dangerous SCADA Flaw

ICS-CERT has warned organizations using Advantech’s ICS products to install an update that kills a remotely exploitable flaw.

2018-11-05

Blockchain Can Improve Manufacturing

Blockchain’s greatest potential to deliver business value is in manufacturing.

2018-09-24

Manufacturing Industry: A Key Target For Cyber Attackers

As manufacturing industry is becoming better connected, the frequency and sophistication of cyber attacks is going up.

2018-06-20

With Robots In Control, Chemical Makers Fight For Formula Ownership

Industrial robots are absorbing huge quantities of sensitive data from both manufacturers and customers, modifying key formulations as they go.

2018-02-28

Corporate Defence Plan Against Cyberattacks

Major industrial companies are joining up to promote stronger safeguards against assaults on digital systems that control critical infrastructure.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-06-29

Industrial Robotics Market Will Triple

This year, the market value of industrial robots worldwide is estimated to hit $14 billion. By 2025, that market is projected to balloon to $33.8 billion.

2017-05-12

Cyber Spies Go Mainstream

Cyber espionage appears to have hit the mainstream as the most popular attack method in the public sector, education & manufacturing industries.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.

MineOS

MineOS

MineOS aligns compliance with business growth. We designed our platform so that privacy compliance efforts directly benefit other teams and initiatives.