 These breaches could lead to manipulating inventory, triggering false alarms or disguising leaks. | | |
 The findings expose upselling practices, discounts and manipulation tactics used by threat actors. | | |
|
The OT Cybersecurity Summit brings together practitioners and experts to address real-world OT risk. Hear practical guidance on securing operations, aligning IT and OT, and protecting uptime in industrial environments. |
Watch the discussion between editorial director Anna Wells and Spot AI on how video AI agents can uncover production floor risks, including missing PPE, idle workstations and operational bottlenecks. |
|
|
|
American manufacturers trail their European counterparts in four key areas, including remote access. | | |
|
|
Research found more than 1,000 zero-day vulnerabilities within ERP applications. | | |
|
|
The combination of notorious hackers and unintentional employer errors can put key portions of your operation at risk. This is why it has become essential for manufacturers to learn more about threat modeling, secure code analysis, and third-party penetration testing to address vulnerabilities. |
|
For manufacturing, this year's findings reflect a sector under sustained attack. | | |
|
|
How knowledge of threat actors is helping to defend against their gains in scale and speed. | | |
|
|
Manufacturing leaders are ditching their outdated systems and talent bottlenecks to reclaim their competitive edge. |
|
Legacy infrastructure combined with complex demands creates unique security challenges. | | |
|
|
The recovery approach helps improve disaster recovery and restore compromised production systems. | | |
|
|
| FEATURED VIDEO | | |  Also on the podcast, Canada kicks its U.S. booze habit, Foxconn confirms cyberattack and why automakers... | | |
|
|
| |
© 2026 All rights reserved, Industrial Media, LLC |
|