Data-Driven Manufacturing
Recent News
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerNov 16, 2022

Implementing a cybersecurity plan includes deploying specific security functions to provide communications, networking, and database security. Learn what key factors to consider, what new technologies are being overlooked, and more for your implementation.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerOct 03, 2022

Configuration management in cybersecurity provides a uniform environment to deploy security updates, and a standardized platform to monitor network activity to identify potential security breaches. Learn what it is, how to use it, and what to watch for.

4m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerSep 01, 2022

Advanced cybersecurity plans should include functionality for logging every attempt to access the network or critical areas on the network to protect business assets or as required for legal or contractual requirements. Read on to learn what that involves.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerAug 08, 2022

The definition and management of the credentials used to access the resources within a company's network requires their own set of rules within an access control strategy. Here are some important security elements to consider with usernames and passwords.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJun 17, 2022

Any advanced cybersecurity plan should address electronic media in both the IT and the OT networks. Devices like CDs, flash drives, and more are problematic since each is an interface to your company’s network, introducing possible security threats.

7m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Tim ShinbaraJun 06, 2022

The MTConnect Institute announces the release of MTConnect Version 2.0. The 2.0 version of the free, open, model-based standard that supports semantics for discrete manufacturing is a significant advancement from previous versions.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerJun 03, 2022

Access control in an advanced cybersecurity plan go well beyond usernames and passwords. It means defining, implementing, and monitoring rules to control which persons and systems may access resources within your company’s network and computer systems.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By Jan SchaferMay 31, 2022

A look at what some of the job shops in the United States are doing.

8m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By AMTMay 25, 2022

Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.

5m read
article.featuredImage.altTextarticle.featuredImage.altText Technology
By John TurnerMay 06, 2022

To build or enhance your company's cybersecurity plan, one of the first steps to consider is mapping out all access points to your company’s systems and network, including the interaction points between various systems within and outside the network.

5m read