<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security &#8211; AutomaTech</title>
	<atom:link href="https://automatech.com/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://automatech.com</link>
	<description>We Make Plant Information Flow</description>
	<lastBuildDate>Wed, 21 Jun 2023 18:42:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://automatech.com/wp-content/uploads/Site-icon-1.gif</url>
	<title>Cyber Security &#8211; AutomaTech</title>
	<link>https://automatech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Strengthening Data Security: Embracing Cloud-Based Historian and Cybersecurity Best Practices</title>
		<link>https://automatech.com/cloud-based-historian-and-cybersecurity/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Wed, 21 Jun 2023 18:25:59 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IIoT & Cloud Solutions]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=30524</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/cloud-based-historian-and-cybersecurity/">Strengthening Data Security: Embracing Cloud-Based Historian and Cybersecurity Best Practices</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Automation-related Myths about Version Control and Backups</title>
		<link>https://automatech.com/automation-myths-backups/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 20:57:16 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=30081</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/automation-myths-backups/">Automation-related Myths about Version Control and Backups</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Breaking Down the Cyber Journey: A Guide to Adopting Systems that Work For You</title>
		<link>https://automatech.com/blog-cyber-journey/</link>
		
		<dc:creator><![CDATA[hughkelly]]></dc:creator>
		<pubDate>Fri, 01 Jan 2016 10:38:21 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://new.automatech.com/?p=2171</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/blog-cyber-journey/">Breaking Down the Cyber Journey: A Guide to Adopting Systems that Work For You</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
