Convergence-enabled cyberattacks—where criminals exploit traditionally isolated operational technology (OT) devices through their new connections to the IT network—may be motivated by the desire to hijack and demand ransom for services, steal trade secrets through industrial or national cyberespionage, or commit cyberterrorism or engage in cyberwarfare.
Displaying 31-40 of 98 results for
Several years ago, a global commercial vehicle maker asked my firm to develop a remote fleet management, health and performance portal that would open a new revenue stream.
Being a competitive player in the aerospace and defense industry is no small feat. In an industry in which you need to be accountable for every piece of an assembly, meeting customer expectations and requirements can be daunting tasks.
The US Department of Defense (DoD) is keen on exploring the implementation of additive equipment in the battlefield and shipboard for quick-turn part fabrication.
The value-add of blockchain for businesses is estimated to grow into the trillions by 2030. Experts believe product recalls alone—estimated to cost $8 million today—could be practically eliminated through improved track and traceability enabled by blockchain.
The Pittsburgh region is a hotbed of activity in robotics and AI. This activity includes research and technology companies that commercialize academic research and solve real world problems.
What is tribal knowledge and why should a company care? It is valuable, exclusive information stored only inside someone’s mind and communicated only verbally (if at all). The “someone” may have played an important role in an organization for decades and knows a thing or two that the company treasures yet cannot duplicate.
In the early days at CNC Software, we saw that our Mastercam CAD/CAM system was only part of a larger manufacturing solution and that an open architecture foundation could allow seamless data communication with complementary devices and systems across the shop floor.
I’m among the first to dive into the latest manufacturing innovations and see how they can improve our customers’ operations. Yet, I’m also among the first to advise them to pause and ensure that the fundamentals of their manufacturing processes are in place before adding something new into the complex mix of functionality and desired outcomes.
Defense systems are, by design, built to defend against threats. Today, however, manufacturers of these systems are focusing on an entirely new kind of threat: security breaches targeting their automation systems.