-
Post Category
Cyber Security
- August 05, 2019
-
Author:
Guest Blog
“Core Baseline” guide offers practical advice for using everyday items that link to computer networks. August 01, 2019 Appliances from refrigerators to thermostats are now available in models that interact with a wireless network, making them easier to control with […]
Read more ...
-
Post Category
Cyber Security
- July 22, 2019
-
Author:
Benny Syverson
NIST will hold a workshop at the Boulder Colorado Laboratories to discuss the role of machine learning (ML) in optical communication systems. Optical communication systems are increasingly used closer to the network edge and are expected to find use […]
Read more ...
-
Post Category
Cyber Security
- July 18, 2019
-
Author:
Guest Blog
Published on 2019-07-10 Manufacturers in the Department of Defense supply chain must properly handle Covered Defense Information (CDI). Here’s how to get started. If you’re part of the Department of Defense (DoD) supply chain, you may have heard about the requirements […]
Read more ...
-
Post Category
Cyber Security
- July 17, 2019
-
Author:
Guest Blog
Manufacturers are increasingly under threat from cyberattacks. This is a real concern not just because of the typical business vulnerabilities (e.g., stolen intellectual property, ransomware) but because in today’s increasingly connected world, a successful infiltration from a cybercriminal could shut […]
Read more ...
-
Post Category
Cyber Security
- July 08, 2019
-
Author:
Guest Blog
July 02, 2019 For information on Cybersecurity in Wisconsin, contact WMEP’s Wil Cox for a free initial consultation. GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is seeking public comment on a draft […]
Read more ...
-
Post Category
Cyber Security
- July 01, 2019
-
Author:
Guest Blog
June 27, 2019 MEDIA CONTACT: Chad Boutin [email protected] . | . 301.975.4261 For a free initial cybersecurity consultation, contact WMEP’s Wil Cox. Seemingly every appliance we use comes in a version that can be connected to a computer network. But […]
Read more ...
-
Post Category
Cyber Security
- June 21, 2019
-
Author:
Guest Blog
New Companion Pub Offers ‘Enhanced Security’ for Information Stored in Critical Programs and Assets June 19, 2019 MEDIA CONTACT: Chad Boutin . | [email protected] . | . 301.975.4261 An update to one of the National Institute of Standards and Technology’s […]
Read more ...
-
Post Category
Cyber Security
- June 21, 2019
-
Author:
Benny Syverson
New Companion Pub Offers ‘Enhanced Security’ for Information Stored in Critical Programs and Assets June 19, 2019 MEDIA CONTACT: Chad Boutin [email protected] 301.975.4261 n update to one of the National Institute of Standards and Technology’s (NIST) information security documents offers […]
Read more ...
-
Post Category
Cyber Security
- April 24, 2019
-
Author:
Tammy Schwarzbauer
The experts at the Wisconsin Manufacturing Extension Partnership (WMEP) have designed a program that conducts a cybersecurity assessment of your business as it pertains to the NIST 800-171 requirements and provides the necessary deliverables. 1. Demonstrate Completion of Assessment. […]
Read more ...
-
Post Category
Cyber Security
- April 19, 2019
-
Author:
Tammy Schwarzbauer
REMOVE THE WEAK LINK – ENSURE COMPLIANCE IN CYBER SECURITY A DEADLINE IS LOOMING. ATTENTION DEPARTMENT OF DEFENSE, GSA AND NASA CONTRACTORS: All Department of Defense (DoD), General Services Administration (GSA) and NASA contractors must meet […]
Read more ...