Imagine this: you are on a beautiful bike ride, miles away from any sign of civilization – you may be a casual biker, or you belong to the bikepacking community (people who go on remote bike trips for days or weeks at a time). The essential devices that keep you safe and connected are in a dire state: a cell phone is on the verge of dying, lights are dead, your external battery pack is running low on juice. What do you do?
Written by Andrew Peterson, NIST.
Collaborative robots are increasingly attractive to manufacturers who require flexible solutions for their growing product mix but may not have the scale of work or capital resources needed to justify larger investments in automation systems.
Written by Celia Paulsen, NIST.
Artificial intelligence (AI)-powered robots, 3D printing, the Internet of Things (IoT)...there’s a whole world of advanced manufacturing technology and innovation just waiting for small and medium-sized manufacturers (SMMs) who want to step up their digital game. Unfortunately, manufacturing digitization can present some fundamental challenges, like added cybersecurity risk.
From time to time, events occur which shine a light on weaknesses as to the flow of data within our existing information systems. Looking back at my year with IMEC, several of these types of events readily come to mind which to a varying degree affected nearly everyone including Y2K, 9/11 and the Great/Global Recession, while many other events affected certain sectors of the populace, such as regional power or widespread internet outages. In each of these instances, system shortcomings were exposed and inconveniences were experienced.
This is an original article by Steve Cavolick of LRS IT Solutions.
The economic downturn from the Coronavirus has rewritten the rules of business and caused entire verticals to change direction overnight, and manufacturing is one of the industries that has morphed quickly in order to lead the country through the pandemic.
When demand exploded earlier this year for goods that sanitized and machines to help very sick people breathe, facilities that produced consumable alcohol switched to making anti-microbial gels and auto manufacturers stopped producing cars in order to build ventilators.
Governmental institutions and companies worldwide are tapping into giant data pools to combat the various public health and economic challenges manifesting from the COVID-19 crisis. During these troubling times, big data analytics is proving to be an ally for first responders and other front line workers in healthcare, food service, manufacturing, and other essential services to address the true scale of challenges.
Every organization has some level of risk that can impact the organization. Regardless of whether you have a formal quality management system or must meet regimented regulations, leadership, as well as additional stakeholders, have a particularly vested interest in identifying and planning for all potential risks to an organization. The National Institute of Standards and Technology (NIST) has created a guide for conducting risk assessments. Regardless of the technology, the establishment of a standard approach is key.
IT / OT Infrastructure, Digital Information and IoT devices
With the spread of COVID-19, new challenges and opportunities will arise for keeping your business safe from cybersecurity threats. As the government and businesses work on mitigating the impact of the ongoing outbreak, social distancing measures are leading to an increase in remote working across all sectors. The immediate challenge is “how can I protect my digital assets from a cyber-attack?” Some key vulnerabilities to a cyberattack are Information Technology / Operational Technology (IT / OT) infrastructure, digital information and Internet of Things (IoT) devices.
This is an original NIST Cybersecurity Insights blog post, written by Jeff Greene.
Your employer has unexpectedly directed you to telework—and you are feeling overwhelmed. With many changes happening at once, telework security could be an afterthought or completely overlooked. This could put you and your organization at increased risk from attackers, who are always looking for opportunities to take advantage of disruption generally and weak security practices specifically. But it’s more than your organization at risk—if your telework device is compromised, anything else connected to your home network could be at risk too.