Mar-Bal Inc. has merged its AltraSet Composite Technologies company with Lattice Composites, Riverside, Calif.
Displaying 9 results for
Current and prospective member companies of the defense industrial base (DIB) have watched with interest as the U.S. Department of Defense (DoD) developed its all-encompassing Cybersecurity Maturity Model Certification (CMMC) program.
OMAX has scheduled its next virtual event, “The Versatile World of Waterjet”
Thanks in part to its pro-business policies, strong workforce, and trade infrastructure, Florida ranks among the nation’s top 10 states for manufacturing.
Mark 2020 as the year the U.S. government chose to stand up a Manufacturing Innovation Institute focused solely on cybersecurity.
Formlabs, known for its line of desktop stereolithography (SLA) printers, is looking to expand its 3D printing reach with availability of its new Fuse 1 benchtop industrial selective laser sintering (SLS) 3D printer. Under development for nearly seven years, the Fuse 1 marks a notable change for Formlabs as they expand into a new additive manufacturing process.
The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic.
FABTECH will be the first large-scale manufacturing trade show to return to McCormick Place in Chicago, September 13-16. The announcement comes as the state of Illinois moves into its final reopening phase.
Cybersecurity is growing more critical every year. Much of the focus has been on protecting information technology (IT) assets, and operational technology security can be been overlooked. In this episode, Alan Rooks, Editor in Chief of Manufacturing Engineering magazine, talks with Michael Rothschild, Senior Director of Marketing for Tenable about what has changed to cause operational technology security to gain a high profile; how OT environments are different from, and similar to IT; what types of attacks are impacting OT environments; what can happen if an OT attack is successful; common methods for detecting OT based attacks; and how proactive security is a powerful strategy for OT security.