Search
Close this search box.

Education

Courtesy: CFE Media screen capture from 2021 Hannover Messe Digital Edition

Cybersecurity is key for digital transformation

Manufacturing is undergoing some major changes and turning toward a digital transformation. Technology is becoming more intertwined with one another thanks to the Industrial Internet of Things (IIoT) and other concepts are bringing everything together. […]

Addressing cybersecurity challenges through collaboration

Addressing cybersecurity challenges through collaboration

Cybersecurity has become a major topic after recent high-profile attacks such as SolarWinds and the Oldsmar attack in Florida. Our work world continues to change due to COVID-19 and is forcing cybersecurity to the front […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Computer chip wins cybersecurity bounty

They fought the chip and the chip won. MORPHEUS, an “unhackable” computer chip developed by computer science researchers at the University of Michigan, lived up to its name in its first bug bounty competition. It […]

Image courtesy: Brett Sayles

Video: How Does Cybercrime Impact My Business?

Video courtesy: CxEnergy Presenter: Derek Hedrick, Ameritech Data Solutions Why has Cybercrime become so prevalent? Because it’s easy, it’s hard to get caught, and it’s really profitable, generating more than $1.5 trillion in 2018 alone. Meanwhile, […]

Courtesy: Seeq Corporation/Microsoft

Hackathon event to analyze, prevent greenhouse gas emissions

Seeq is co-sponsoring the Microsoft Energy Core Methane Emissions Hackathon virtual event. The objective of the hackathon is to overlay oil & gas asset and geographic information system data to pinpoint leak location, and to […]

eBook: Threats and Vulnerabilities

eBook: Threats and Vulnerabilities

Featured articles in this eBook include stories on cybersecurity for IIoT robots, cybersecurity asset updates and using cybersecurity to improve tomorrow’s manufacturing operations.

Courtesy: CFE Media screen capture from 2021 Hannover Messe Digital Edition

Cybersecurity is key for digital transformation

Manufacturing is undergoing some major changes and turning toward a digital transformation. Technology is becoming more intertwined with one another thanks to the Industrial Internet of Things (IIoT) and other concepts are bringing everything together. […]

Addressing cybersecurity challenges through collaboration

Addressing cybersecurity challenges through collaboration

Cybersecurity has become a major topic after recent high-profile attacks such as SolarWinds and the Oldsmar attack in Florida. Our work world continues to change due to COVID-19 and is forcing cybersecurity to the front […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Computer chip wins cybersecurity bounty

They fought the chip and the chip won. MORPHEUS, an “unhackable” computer chip developed by computer science researchers at the University of Michigan, lived up to its name in its first bug bounty competition. It […]

Image courtesy: Brett Sayles

Video: How Does Cybercrime Impact My Business?

Video courtesy: CxEnergy Presenter: Derek Hedrick, Ameritech Data Solutions Why has Cybercrime become so prevalent? Because it’s easy, it’s hard to get caught, and it’s really profitable, generating more than $1.5 trillion in 2018 alone. Meanwhile, […]

Courtesy: Seeq Corporation/Microsoft

Hackathon event to analyze, prevent greenhouse gas emissions

Seeq is co-sponsoring the Microsoft Energy Core Methane Emissions Hackathon virtual event. The objective of the hackathon is to overlay oil & gas asset and geographic information system data to pinpoint leak location, and to […]

eBook: Threats and Vulnerabilities

eBook: Threats and Vulnerabilities

Featured articles in this eBook include stories on cybersecurity for IIoT robots, cybersecurity asset updates and using cybersecurity to improve tomorrow’s manufacturing operations.

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES