Articles Search Results

299 Articles and 0 related Products found for cyberattacks
  • What OT needs to know about cybersecurity
    Increased adoption of IIoT has introduced new risks, particularly security breaches against OT devices that are not properly protected. Foll...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 7 / 4
  • How to keep video systems from being hacked?
    More and more, video surveillance systems are based on IP whereby video feeds are transmitted over the network. While this has introduced co...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 5 / 31
  • How to best carry out IT/OT system integration
    Integration of IT and OT systems can help to streamline manufacturing operations and improve equipment performance. Although there are costs...
    Editor / Provider: John Liu | Updated: 2019 / 3 / 27
  • What are some common security issues in IIoT?
    The smart factory concept, enabled with IIoT, has in many ways transformed manufacturing. Yet with so many connected devices in place, they ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 3 / 14
  • Think your badge reader is secure? Think twice.
    The security of access control can be overlooked. Specifically, being an IoT device, the access control reader is as vulnerable to IoT secur...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 3 / 5