Data-Driven Manufacturing
Recent News
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJan 26, 2023

Any cybersecurity implementation involves a trade-off between a company’s tolerance for risk and the effort and costs associated with protecting the company’s resources and customers. Learn how to assess risk and test for vulnerabilities in your network.

4m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJan 12, 2023

A company's cybersecurity plan requires constant monitoring and maintenance in order to effectively detect, analyze, contain, recover, and prevent attacks. Learn what steps personnel should take when an incident is detected and how to maintain the system.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Stephen LaMarcaJan 03, 2023

You can set up free machine monitoring in as little as 30 minutes using a tool created by the great folks at Oak Ridge National Laboratory (ORNL)...

4m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Stephen LaMarcaDec 30, 2022

Ultra-premium, bougie digital twin. Michigan incentivizes industry 4.0 embrace. Metal health. "Go hug a driver or hug a worker in a distribution center."

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerDec 07, 2022

A key aspect of any advanced cybersecurity plan is oversight and management of company and supplier personnel to address events originating within a company – intentional or not. Find out what considerations should be made when implementing your plan.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerNov 16, 2022

Implementing a cybersecurity plan includes deploying specific security functions to provide communications, networking, and database security. Learn what key factors to consider, what new technologies are being overlooked, and more for your implementation.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerOct 03, 2022

Configuration management in cybersecurity provides a uniform environment to deploy security updates, and a standardized platform to monitor network activity to identify potential security breaches. Learn what it is, how to use it, and what to watch for.

4m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerSep 01, 2022

Advanced cybersecurity plans should include functionality for logging every attempt to access the network or critical areas on the network to protect business assets or as required for legal or contractual requirements. Read on to learn what that involves.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerAug 08, 2022

The definition and management of the credentials used to access the resources within a company's network requires their own set of rules within an access control strategy. Here are some important security elements to consider with usernames and passwords.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJun 17, 2022

Any advanced cybersecurity plan should address electronic media in both the IT and the OT networks. Devices like CDs, flash drives, and more are problematic since each is an interface to your company’s network, introducing possible security threats.

7m read