Networking & Security - Cyber Security

Local data center can serve a local cloud

Local data center can serve a local cloud

Technology Update: Smart data management may include keeping a data center on location as part of a... » more

Double interest in cybersecurity

Double interest in cybersecurity

Think Again: Convergence of cybersecurity efforts from operational and information technology... » more

Six best practices for implementing and securing IIoT products

Six best practices for implementing and securing IIoT products

The practice of “securing by design” can help companies protect against potential cyber attacks on... » more

Security's role in manufacturing automation

Security's role in manufacturing automation

Advances in technologies can lead to great things for the manufacturing automation sector, but... » more

Technology, cyber attacks are both on the rise

Technology, cyber attacks are both on the rise

General Michael Hayden, former director of the CIA and the NSA, addressed the advances of... » more

Spending on security-related services expected to rise in 2018

Spending on security-related services expected to rise in 2018

Global spending on security-related hardware, software, and services should hit $91.4 billion in... » more

Process safety controller for extreme, hazardous environments

Process safety controller for extreme, hazardous environments

Schneider Electric's Tricon CX version 11.3 is a dual-certified process safety controller that is...

Operators lack ability to secure critical infrastructure from security threats

Operators lack ability to secure critical infrastructure from security threats

Almost 60% of executives at critical infrastructure operators said they lack appropriate controls... » more

Cybersecurity education outreach pact reached

Cybersecurity education outreach pact reached

Florida International University (FIU) reached a cooperative agreement with the National Institute... » more

Reworking the gender balance in the AI, IoT industries

Reworking the gender balance in the AI, IoT industries

Women in STEM: Bringing more women into the artificial intelligence (AI) and Internet of Things... » more

Manufacturing, healthcare industries biggest targets of security attacks

Manufacturing, healthcare industries biggest targets of security attacks

Verizon's annual data breach report revealed manufacturing and healthcare were the biggest targets... » more

Federal grants awarded to boost cybersecurity research

Federal grants awarded to boost cybersecurity research

Seven organizations earned over $5.6 million in federal money to develop new tools to help... » more

Survey: Senior executives not confident in cyber protection

Survey: Senior executives not confident in cyber protection

While company executives are aware of cybersecurity's importance, few are confident in their... » more

Local data center can serve a local cloud Double interest in cybersecurity Six best practices for implementing and securing IIoT products Security's role in manufacturing automation Technology, cyber attacks are both on the rise Spending on security-related services expected to rise in 2018 Process safety controller for extreme, hazardous environments Operators lack ability to secure critical infrastructure from security threats Cybersecurity education outreach pact reached Reworking the gender balance in the AI, IoT industries Manufacturing, healthcare industries biggest targets of security attacks Federal grants awarded to boost cybersecurity research Survey: Senior executives not confident in cyber protection

Avoid the worst control system ever

Automation System Integration Blog: Nobody wants to get a screaming... » more

All Blog Entries
click me