Articles & News on Connectivity & Cybersecurity
How to Implement Cybersecurity Automation in Education
- by Zac Amos
- May 30, 2024
- Feature
The education system is one of those industries with abnormally high risk, making it all the more crucial to implement advanced security measures like automation.
Seven Best Practices for Secure RPA Implementation
- by Zac Amos
- May 24, 2024
- Feature
While RPA is often more accurate than humans, it is imperfect—overreliance can lead to critical security-endangering mistakes.
SugarCRM Acquires sales-i to Enhance Customer Sales Profitability, Drive Intelligent Account Management
- May 24, 2024
- News
This longstanding partnership paves the way to reach more customers as the combination unlocks the value of a company’s ERP and CRM data.
How Machine Learning Revolutionizes Automation Security with AI-Powered Defense
- by John Funk
- May 20, 2024
- Feature
Machine learning is sometimes considered a subset of overarching AI. But in the context of digital security, it may be better understood as a driving force, the fuel powering the engine.
EtherCAT Technology Group Distributes 4,000th EtherCAT Vendor ID
- May 17, 2024
- News
With the assignment of the 4,000th EtherCAT Vendor ID, the EtherCAT Technology Group (ETG) once again showcases the outstanding diversity of EtherCAT manufacturers.
Wibu-Systems Revolutionizes Software Protection, Winning the 2024 German Innovation Award
- May 15, 2024
- News
Wibu-Systems proudly announces that its innovative AxProtector Compile Time Protection (CTP) has been honored with the 2024 German Innovation Award.
The Growing Importance of System Redundancy in Industry 4.0
- by Emily Newton
- May 15, 2024
- Feature
As more organizations embrace digitization under Industry 4.0, those concerns have grown all the more prevalent. It’s now safe to say that thoughtful redundancy is essential for business continuity.
AI and Cloud Computing: An Intrinsic Link
- by Tchule Ribeiro
- May 10, 2024
- Feature
The advancement of artificial intelligence (AI) is intrinsically linked to the scalability provided by cloud computing.
The Role of Computer Vision in Cybersecurity Automation
- by Zac Amos
- May 10, 2024
- Feature
Computer vision is crucial in cybersecurity for enhancing threat detection through pattern recognition and anomaly identification.
SPAN Ports and OT Continuous Monitoring: Securing Otherwise Insecure Network Traffic
- by Moreno Carullo
- May 10, 2024
- Feature
Modern networking, SPAN port evolution and protocol interoperability paved the way for operational technology (OT) and ICS network monitoring and cybersecurity.
Subscribe to our publications
- eBooks
- Newsletter
Receive the latest automation content, sent to your inbox in the form of enewsletters or ebooks. You pick the topics, we take care of the rest!
Subscribe