Posts Tagged ‘cyber security’

The former president of a transportation company in Texas was sentenced in federal court last month to five years in prison for hacking into his former employer’s computer network and stealing proprietary business information he intended to use for his start-up. The case underscores the fact that much like major corporations, small and medium-sized enterprises (SMEs) are targets for industrial espionage. Read more

Security concept: blue opened padlock on digital background

Though manufacturers think they’re doing a better job safeguarding data, cybersecurity breaches are increasing. So says a PricewaterhouseCoopers (PwC) study, which finds that “while organizations have made significant security improvements, they have not kept pace with today’s determined adversaries.”  Read more

Silhouette of a hacker isloated on black

While data, particularly financial data, are the most common prey for hackers, there’s a growing concern about a more vulnerable target. Hackers are increasingly taking aim at industrial control systems (ICS), which are technologies and networks used to operate manufacturing, power generation or other machinery — together with the supervisory control and data acquisition systems (SCADA) and networks that oversee ICS. Read more


Manufacturers have become highly attractive targets for cyber attackers, which can steal and sell the huge amounts of data they produce. But manufacturers can fight back by using Big Data, tying together supply chain systems, functionality, and network information to gain meaningful insight into security flaws and events.
Read more


Smartphones and tablet computers have drastically changed the way business professionals consume and use information, and the mobile devices offer significant opportunities for manufacturers in on-the-job learning and training for their workforce.
Read more


President Barack Obama has issued a new executive order calling on the federal government to develop cyber security standards for companies that operate key utilities, such as electric grids, telecommunications networks, and air traffic control systems. Will the president’s move succeed in shoring up security gaps? Read more

Also Featured in IMT
Recommended Reading
what went wrong book cover
| Featured Manufacturing Jobs

Featured Product News

View More Product News
Light Friday Crib Sheet Worth A Look
Press Releases
Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by        Browse ThomasNet Directory

Copyright© 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy

Thank you for commenting close

Your comment has been received and held for approval by the blog owner.
Error close

Please enter a valid email address