Welcome, Guest  |  Login    Register

Are Factories of the Future Sailing Into a Perfect Cyber Storm?

In the Manufacturing 4.0 era, navigating the cyber security waters ahead will not simple, and it must not be thought of as an IT problem, Anthony King, Chief Information Security Officer Director, IT Security Operations/Governance, Risk and Compliance at …
In the Manufacturing 4.0 era, navigating the cyber security waters ahead will not be simple, and it must not be thought of as an IT problem, Anthony King, Chief Information Securit… http://www.gildevents.gilcommunity.com/blog/are-factories-future-sailing-perfect-cyber-storm/

Warning: More Manufacturing Cyber Attacks in The Year Ahead

The U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team warned that cyber attacks aimed at the U.S. critical manufacturing sector doubled in 2015 and are increasingly targeting industrial control systems.
Speaking at the S4 Security Conference in Miami last week, Marty Edwards, head of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Te… http://www.gildevents.gilcommunity.com/blog/warning-more-manufacturing-cyber-attacks-year-ahead/

From Carjacking to Car Hacking – Lessons for the Internet of Things

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a multitude of new security con…
By Connor A. Sabatino, Foley & Lardner LLP The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with somethi… http://www.gildevents.gilcommunity.com/blog/carjacking-car-hacking-lessons-internet-things/

DMDII Launches Seven Digital Manufacturing R&D Projects

What are the core technologies, process, and skills that manufacturers can employ to assess cyber security vulnerabilities they may face, increase the productivity of shop floor workers using wearable devices and augmented reality, and create a digital t…
What are the core technologies, process, and skills that manufacturers can employ to  assess cyber security vulnerabilities they may face, increase the productivity of shop floor … http://www.gildevents.gilcommunity.com/blog/dmdii-launches-seven-digital-manufacturing-rd-projects/

The Benefit of the Sony Cyber Attack

If nothing else, the recent cyber attack, apparently by North Korea, against Sony for producing the satiric film “The Interview” should serve to raise to the highest level the issue of cyber protection on the agendas of every board of directors in the man…
If nothing else, the recent cyber attack, apparently by North Korea, against Sony for producing the satiric film “The Interview” should serve to raise to the highest level the iss… http://www.gildevents.gilcommunity.com/blog/benefit-sony-cyber-attack/

Manufacturing Trends to Watch in 2015

As the new year begins, the editorial team at the Manufacturing Leadership Council offers its predictions for the year ahead:
As the new year begins, the editorial team at the Manufacturing Leadership Council offers its predictions for the year ahead: U.S. Manufacturing Growth to Continue Strongly. L… http://www.gildevents.gilcommunity.com/blog/manufacturing-trends-watch-2015/

Cybersecurity: Manufacturing Malware On The Rise

Recent revelations about the so-called “Regin” spying virus, plus new potential cyber threats to energy and national infrastructure systems, are pushing cybersecurity firmly back to the top of the manufacturing industry’s worry list.
Popular Discussions Recent revelations about the so-called “Regin” spying virus, plus new potential cyber threats to energy and national infrastructure systems, are … http://www.gildevents.gilcommunity.com/discussion/cybersecurity-manufacturing-malware-rise/

Cybersecurity: NIST Issues a Framework to Protect Critical Infrastructure

The National Institute of Science and Technology has issued a set of standards and best practices to protect the nation’s critical infrastructure – including information systems and industrial control systems in manufacturing companies – from cyber attack…
The National Institute of Science and Technology has issued a set of standards and best practices to protect the nation’s critical infrastructure – including information systems a… http://www.gildevents.gilcommunity.com/blog/cybersecurity-nist-issues-framework-protect-critical-infrastructure/

CAD in the Cloud? Sorry, It’s Not Happening

Now that many manufacturers are finally embracing cloud enablement of a wider range of systems and data—including salesforce automation, HR, procurement, even ERP—can a migration of core product data and CAD applications to the cloud be far behind? Yes, …
Popular Discussions Now that many manufacturers are finally embracing cloud enablement of a wider range of systems and data—including salesforce automation, HR, procuremen… http://www.gildevents.gilcommunity.com/discussion/cad-cloud-sorry-its-not-happening/

The Internet: Now, Everyone Knows You’re A Dog

Remember that now-famous New Yorker cartoon about the dog and the Internet? Published in 1993, the cartoon showed a canine saying that, on the Internet, nobody knows you’re a dog. At that time, the prevailing view was that the Internet was a great leveler…
By David R. Brousell Remember that now-famous New Yorker cartoon about the dog and the Internet? Published in 1993, the cartoon showed a canine saying that, on the Internet, no… http://www.gildevents.gilcommunity.com/blog/internet-now-everyone-knows-youre-dog/

President Resorts to Executive Order on Cybersecurity

Frustrated by Congressional inaction on cyber-security legislation, President Obama has resorted to executive action to protect the nation’s infrastructure. But will it be enough to get the job done?
Frustrated by Congressional inaction on cyber-security legislation, President Obama has resorted to executive action to protect the nation’s infrastructure. But will it be e… http://www.gildevents.gilcommunity.com/discussion/president-resorts-executive-order-cybersecurity/

Cybersecurity: The Senate Refuses to Act as the Threat Grows

Late last week, in a 52-46 vote, the U.S. Senate blocked a bill that would have established new and much needed cybersecurity rules. The measure, called the Cybersecurity Act of 2012, fell when it failed to get the 60 votes necessary to break a filibuster…
Late last week, in a 52-46 vote, the U.S. Senate blocked a bill that would have established new and much needed cybersecurity rules. The measure, called the Cybersecurity Act of 2… http://www.gildevents.gilcommunity.com/blog/cybersecurity-senate-refuses-act-threat-grows/

Cyber Attacks: New Worm Raises the Stakes

The notion that state-sponsored cyber attacks threaten industrial targets gained momentum recently with reports that a new, highly virulent worm has hit oil field and other petroleum industry systems in the Middle East. The so-called Flame worm reportedly…
The notion that state-sponsored cyber attacks threaten industrial targets gained momentum recently with reports that a new, highly virulent worm has hit oil field and other petrol… http://www.gildevents.gilcommunity.com/discussion/cyber-attacks-new-worm-raises-stakes/

Cyber-Security: How to Prevent ‘Digital Assassination’

When manufacturers think about cyber-security, they often, almost reflexively think about areas of the business such as control systems, enterprise applications, and intellectual property in general. That's good because as more and more things get connect…
When manufacturers think about cyber-security, they often, almost reflexively think about areas of the business such as control systems, enterprise applications, and intellectual … http://www.gildevents.gilcommunity.com/blog/cyber-security-how-prevent-digital-assassination/

What Should Cyber-Regulation Cost You? As Much as It Takes

A cyber-showdown is looming in the U.S. Congress. Legislators are beginning to hash out what cybersecurity should mean to private sector companies such as yours. Fault lines are forming. Hawks are turning intodoves, doves into hawks.
A cyber-showdown is looming in the U.S. Congress. Legislators are beginning to hash out what cybersecurity should mean to private sector companies such as yours. Fault lines are f… http://www.gildevents.gilcommunity.com/blog/what-should-cyber-regulation-cost-you-much-it-takes/

Manufacturing Competitiveness: A Road Map for Strengthening U.S. Industry

If politicians and policy-makers really want to know what they can do to support the revival of U.S. manufacturing and put their constituents back to work, they should start by reading “Make: An American Manufacturing Movement."
If politicians and policy-makers really want to know what they can do to support the revival of U.S. manufacturing and put their constituents back to work, they should start by re… http://www.gildevents.gilcommunity.com/blog/manufacturing-competitiveness-road-map-strengthening-us-indu/

Are You Feeling Insecure About Cyberspace?

Security in computer and communications networks and on the Internet has been a pet peeve of mine for years. When computer vendors, telecom companies, and others tell me that their systems are protected and safe, I just find it harder and harder to believ…
If you are, you are not alone. Security in computer and communications networks and on the Internet has been a pet peeve of mine for years. When computer vendors, telecom compani… http://www.gildevents.gilcommunity.com/blog/are-you-feeling-insecure-about-cyberspace/

Collaborative Tools Drive Enterprise Value Networks

While the key business drivers for success may not have altered significantly for the manufacturing sector over the past year, the intensity of change continues to increase. This growing intensity now demands new value-chain approaches that harness the la…
While the key business drivers for success may not have altered significantly for the manufacturing sector over the past year, the intensity of change continues to increase. This … http://www.gildevents.gilcommunity.com/blog/collaborative-tools-drive-enterprise-value-networks/

It’s Time to Take a Strategic Approach to Security

Stuxnet is just the beginning of the security threat for which manufacturing executives must prepare.
Stuxnet is just the beginning of the security threat for which manufacturing executives must prepare. Most top executives and IT leaders figured out a long time ago that develo… http://www.gildevents.gilcommunity.com/blog/its-time-take-strategic-approach-security/

Blog Search

Blog Search


Search Results

CAD in the Cloud? Sorry, It’s Not Happening  in
Posted by Unknown user on Jun 12, 2013
Views: 10741
President Resorts to Executive Order on Cybersecurity  in
Posted by Unknown user on Feb 14, 2013
Views: 8122
Cyber Attacks: New Worm Raises the Stakes  in
Posted by Unknown user on Jun 11, 2012
Views: 5131