Articles

Tony Bosse
dreamstime_m_230627934
“Resilience has become a profit lever,” according to the Rockwell Automation release, which reveals that 96% of respondents have already invested or plan to invest in cybersecurity...
Wave Break Media Ltd
dreamstime_m_321304198
Increasing interconnectedness makes modern manufacturing vulnerable to exploitation, but technologies such as SASE can counter the sophisticated threats plants are facing.
Siemens Digital Industries Software
Jeff Lowry at Realize LIVE 2025 in Detroit in early June.
Outsourcing cloud-based software frees up resources and can save time in a fast-moving project timeline. But you’d better trust the provider, advises Workhorse CIO Jeff Mowry,...
Nuttapong Punna
dreamstime_m_270830535
Digital transformation has brought us AI, digital twins, and IoT—all built for productivity—but when trust is misplaced or unverified, the consequences can be severe and expensive...
Olegunnar
dreamstime_m_27990971
By focusing ZT at the application and services layers and using data diodes between IoT devices and filtering between internal and external users, operators can take significant...
Michael Borgers
dreamstime_m_120151503
The M&S incident underscores a broader and more critical truth: Any organization that relies on digital systems is vulnerable.
Dragoscondrea
dreamstime_m_379621991
For an industry where unplanned downtime costs $125,000 per hour, the convergence of AI adoption, third-party dependencies, and escalating cyber threats cannot be ignored.
Wave Break Media Ltd
dreamstime_m_358009769
Your cybersecurity posture is only as strong as your weakest vendor.
Audiohead
dreamstime_m_96376908
GuidePoint Security report sees 102% year-over-year increase in ransomware victims and a 56% surge in number of groups behind that type of cyberattack. A separate Armis study ...
Thanapol Mongta
dreamstime_m_264850937
Third-party supplier networks can fall prey to cyberattack, but exchanges ensure every file transfer, document share, and system integration is verified, encrypted, and monitored...
Abstract © Nawadoln Siributr
dreamstime_m_92824317
Paper from Palo Alto Networks and Siemens emphasizes the risks to SCADA systems and OT devices connected to the public internet.
Stevanovicigor
dreamstime_m_133405576
The security adviser at Silverfort weighs in on the convergence of OT and how it's reshaping cybersecurity, why manufacturing is so often targeted, and AI and IoT's role in the...
Bsenic
dreamstime_m_47881491
ReliaQuest report for Aug. 1, 2024, through Jan. 31, 2025, noted a “turbulent threat landscape” with attackers ramping up their abuse of remote external services software.
Denisismagilov
dreamstime_m_332253580
Sponsor Yubico provided the platform for three panelists, including Smart Industry's Scott Achelpohl, to discuss cyber defense and what manufacturers can do now that threat actors...
Niall Wiggan
dreamstime_m_237968415
What if the bad guys manage to destroy, damage, or encrypt your backup data in addition to your production data? In that case, you're pretty much out of luck.