Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity

See Yourself in Cyber

Your company is too small to be targeted for a cyberattack, right? That’s what Cincinnati Crane and Hoist (CCH) thought too. Like many small and medium-sized

Commonly Misused Terms in Cybersecurity

Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or Mark Twain or any of the other

Maintaining Your Online Privacy

It might not be the most important subject on your mind when running your business, but online privacy is becoming increasingly important as we move closer to a

The Future of Connected Devices

With the increasing power of digital technology, the vision of a connected manufacturing system that can sense, analyze and respond will soon be a reality. This

Securing Internet-Connected Medical Devices

Lions and Tigers and Bears — Oh My! Upon arrival in an unfamiliar landscape in The Wizard of Oz, Dorothy observed, “Toto, I’ve a feeling we’re not in Kansas

If You Connect It, Protect It!

Meet Humphrey Humphrey is a gray squirrel that a friend of mine rescued as an abandoned baby squirrel. For weeks, my friend and his family nursed the young

Creating a Culture of Security

October is National Cybersecurity Awareness Month. It also happens to be (among other things) Breast Cancer Awareness Month, Dental Hygiene Month, National

When Business is Slow

Nobody likes business to be slow. If you’re in a fast-paced world like manufacturing, seeing your machines or employees idle can drive a person insane. If you

How to Recover from a Cyber Attack

This article originally appeared on IndustryWeek . Guest blog post by Traci Spencer , Grant Program Manager for TechSolve, Inc., the southwest regional partner

How to Respond to a Cyber Attack

This article originally appeared on IndustryWeek . Guest blog post by Traci Spencer, Grant Program Manager for TechSolve, Inc., the southwest regional partner

Search

Put exact phrase in quotes (e.g., "advanced manufacturing")

Email alerts

Subscribe to free e-mail alerts from the Manufacturing Innovation blog by entering your e-mail address in the box below.

Categories

About this blog

Manufacturing Innovation, the blog of the Manufacturing Extension Partnership (MEP), is a resource for manufacturers, industry experts and the public on key U.S. manufacturing topics. There are articles for those looking to dive into new strategies emerging in manufacturing as well as useful information on tools and opportunities for manufacturers.

The views presented here are those of the author and do not necessarily represent the views or policies of NIST.

If you have any questions about our blog, please contact us at mfg [at] nist.gov (mfg[at]nist[dot]gov).