Careers Contact
Home

LATEST NEWS

< BLOG / >

Cybersecurity Concerns for Ancillary Strength Control Subsystems

Additive manufacturing (AM) engineers have been incredibly creative in developing ancillary systems that modify a printed parts mechanical properties.  These [...]
READ MORE ›

AM Botnet as a Vector for Energy Market Manipulation

The Federal Energy Regulatory Commission (FERC) reported 16 potential market manipulation cases in 2018.  The 1990’s saw a restructuring of [...]
READ MORE ›

Building Trust in AI Manufacturing Systems with BISON

To extract the greatest value from advanced manufacturing, a shift to codesign with AI is needed to realize the full [...]
READ MORE ›

Proactive Defense: Preparing for Cyber Threats in Additive Manufacturing

As additive manufacturing (AM) matures and continues to gain popularity, it becomes an increasingly attractive target for cyberattacks. Therefore, being [...]
READ MORE ›

Prints, Piracy, and Protection: Safeguarding 3D IP

The growing accessibility of 3D printers and downloadable models online has made it easier than ever to produce products and [...]
READ MORE ›

Adding a “Dimension” to Swatting

Imagine you are a hobbyist 3D printer who has not considered the cybersecurity concerns of your connected additive devices.  You [...]
READ MORE ›

Goal Zero Firmware Inverter Exploitation – Disrupting AM with a UPS

Can 3D print operations be disrupted from an upstream exploit?  In this blog we will explore how an alternative energy [...]
READ MORE ›

Why The Additive Manufacturing Industry Should Pay Attention To 2023 Cybersecurity Trends

It’s the start of conference season for the major USA Additive Manufacturing (AM) events, with TIPE just finished and AMUG [...]
READ MORE ›

Fact Checking Hollywood 3D Printer Hacking

How accurate is this scene from Person of Interest Honor Among Thieves – Season 4 Episode 7? In this scene [...]
READ MORE ›

AI Optimization of Processes in AM Environments

There are several barriers to the widespread adoption of desktop 3D printers. One of the main barriers is the high [...]
READ MORE ›
1 2 3 4

SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION

Contact
chevron-down