Converging information technology (IT) and operations technology (OT) does little to move end-to-end digitalization forward. What makes digitalization really work is successful OT and IT collaboration and an understanding of what the other side needs. See 7 tips for smarter OT and IT collaboration.
Long before Industry 4.0 and cloud-connected architectures became possible, innovators championed PC-based technologies for industrial automation.
Cloud technologies enable remote connectivity for industrial applications, but can introduce security issues unless built from the ground up with cybersecurity in mind. See top five cybersecurity issues to address.
Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.
A study from North Carolina State University finds that companies that disclosed cybersecurity risk management efforts before and after a competitor’s breach fared the best.
Six pillars of Industry 4.0: There’s so much talk about Industry 4.0, but many companies haven’t stopped to ask what success looks like and how to achieve it. Start with asking three questions, why the company needs Industry 4.0 and how to achieve success.
Researchers at the University of Wisconsin-Madison are using machine learning methods that could allow scientists to strengthen nuclear security by giving scientists on the ground vital information quickly.
Researchers at the University of Michigan and University of Louisiana at Lafayette demonstrated an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.
While industry sectors are starting to automate their processes to help increase productivity and efficiency and this requires greater connectivity, which also can expose systems to attack.
Two leading methods exist for establishing mobile human-machine interface (HMI) connectivity; one providing more cybersecurity. See table comparison of remote access HMI connections.