The latest report from Computing Research Association’s Computing Community Consortium (CCC) together with MForesight, a federally-funded consortium for the U.S. manufacturing industry says that US Manufacturers are prime targets for cyber-attacks and cyber-espionage. The report entitled, “Cybersecurity for Manufacturers,” is calling for the government and industry to collaborate on an effective cybersecurity framework to safeguard against any future major attacks on this sector. Edgard Capdevielle, CEO at Nozomi Networks commented below.
“In the past, the manufacturing sector has been concerned about cyberattacks that aim to extract intellectual property such as engineering information, formulas, or other proprietary data that might be the target of industrial espionage. However, recent attacks on a wide range of industries have raised concern about the resiliency and reliability of the supply chain that is critical to manufacturing operations and to other aspects of national security, such as military equipment and supplies. Now manufacturers have join the ranks of other critical infrastructure industries taking steps to secure not only their intellectual property, but also their operational systems and industrial control systems (ICS) that comprise the foundation of production line operations. Leading edge companies are using technologies that apply artificial intelligence and machine learning for real-time detection and response to cyber-attacks. The frequency and sophistication of cyberattacks targeting manufacturing is likely to accelerate. Fortunately, the latest technological advances are giving manufacturers the tools to help detect and remediate their operations amid an escalating threat landscape.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.