Articles & News on Connectivity & Cybersecurity
OPC Foundation and CESMII initiated new joint working group joined by major industry players to enable manufacturers to speed up pre-built shopfloor and digitalization applications.
Eaton Achieves Industry First: Dual IEC and UL Cybersecurity Certifications for Product Development Processes
Third-party accreditations of Eaton’s processes give customers confidence its products are built to be secure by design.
- by Mark Hellinghuizer
Developing a cybersecurity strategy begins with understanding the current situation, including existing risks.
The National Electrical Manufacturers Association (NEMA) worked with consultants at ABI Research to develop a new guidance document, NEMA 5G 1 5G Best Practices Technical Guidance Report.
IETF recommends the SmartBlue CPace protocol for password-protected access to instruments.
- by Thomas J. Burke
Consumer electronics manufacturing is a fast-paced industry. To maintain and enhance their competitive edge, companies in this sector need to regularly adopt innovative technologies in their plants and their products to meet ever-evolving market demands. Currently, this means adopting smart, interconnected manufacturing approaches to create highly responsive and productive factories. To achieve such infrastructure, businesses should invest in the right industrial communications technology.
New Survey Finds Most Industrial Organizations Are Inadequately Prepared for an OT Cybersecurity Attack
Survey results to be discussed at PAS OptICS 2020 conference along with more than two dozen sessions featuring industry executives, experts, and practitioners.
With currently 37 members, the number of founding members in November 2019 has more than quintupled even before its first birthday. Clear tendency: More and more members are joining every week.
UL brings robust operational technology cybersecurity, industrial automation and control systems expertise to industry cybersecurity group.
Eaton envisions faster approach to develop measurable global conformance assessment for cybersecurity.
Subscribe to our publications
Receive the latest automation content, sent to your inbox in the form of e-newsletters or ebooks. You pick the topics, we take care of the rest!Subscribe