Networking & Security - Cyber Security

Embedded vision finds new uses in security and surveillance applications

Embedded vision finds new uses in security and surveillance applications

Embedded vision technology is advancing security and surveillance capabilities in a number of... » more

Importance of IIoT safety and connectivity

Importance of IIoT safety and connectivity

Cybersecurity can make or break a manufacturing enterprise with the advent of the Industrial... » more

European consortium aims to improve IoT security, interoperability

European consortium aims to improve IoT security, interoperability

International: A European consortium is to begin working on Brain-IoT, a framework to improve the... » more

Local data center can serve a local cloud

Local data center can serve a local cloud

Technology Update: Smart data management may include keeping a data center on location as part of a... » more

Double interest in cybersecurity

Double interest in cybersecurity

Think Again: Convergence of cybersecurity efforts from operational and information technology... » more

Six best practices for implementing and securing IIoT products

Six best practices for implementing and securing IIoT products

The practice of “securing by design” can help companies protect against potential cyber attacks on... » more

Security's role in manufacturing automation

Security's role in manufacturing automation

Advances in technologies can lead to great things for the manufacturing automation sector, but... » more

Technology, cyber attacks are both on the rise

Technology, cyber attacks are both on the rise

General Michael Hayden, former director of the CIA and the NSA, addressed the advances of... » more

Spending on security-related services expected to rise in 2018

Spending on security-related services expected to rise in 2018

Global spending on security-related hardware, software, and services should hit $91.4 billion in... » more

Process safety controller for extreme, hazardous environments

Process safety controller for extreme, hazardous environments

Schneider Electric's Tricon CX version 11.3 is a dual-certified process safety controller that is...

Operators lack ability to secure critical infrastructure from security threats

Operators lack ability to secure critical infrastructure from security threats

Almost 60% of executives at critical infrastructure operators said they lack appropriate controls... » more

Cybersecurity education outreach pact reached

Cybersecurity education outreach pact reached

Florida International University (FIU) reached a cooperative agreement with the National Institute... » more

Reworking the gender balance in the AI, IoT industries

Reworking the gender balance in the AI, IoT industries

Women in STEM: Bringing more women into the artificial intelligence (AI) and Internet of Things... » more

Embedded vision finds new uses in security and surveillance applications Importance of IIoT safety and connectivity European consortium aims to improve IoT security, interoperability Local data center can serve a local cloud Double interest in cybersecurity Six best practices for implementing and securing IIoT products Security's role in manufacturing automation Technology, cyber attacks are both on the rise Spending on security-related services expected to rise in 2018 Process safety controller for extreme, hazardous environments Operators lack ability to secure critical infrastructure from security threats Cybersecurity education outreach pact reached Reworking the gender balance in the AI, IoT industries

Avoid the worst control system ever

Automation System Integration Blog: Nobody wants to get a screaming... » more

All Blog Entries
click me