{"id":94859,"date":"2023-06-15T12:00:00","date_gmt":"2023-06-15T10:00:00","guid":{"rendered":"https:\/\/industry-science.com\/?post_type=article&#038;p=94859"},"modified":"2024-09-26T17:32:25","modified_gmt":"2024-09-26T15:32:25","slug":"every-company-is-vulnerable","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/every-company-is-vulnerable\/","title":{"rendered":"&#8220;Every Company is Vulnerable and Needs to Protect Itself Appropriately&#8221;"},"content":{"rendered":"<p><!-- GITO PUB shortened content start --><\/p>\n<div class=\"gito-pub-frontend-post-protected\"><\/div>\n<p><!-- GITO PUB shortened content end --><\/p>\n<div style=\"display:block;text-align:center !important;margin:30px 0;\">\n<div style=\"display:inline-block;border:1px solid #555;padding:10px;max-width:600px;text-align:left;\">\n<h2 class=\"gito-pub-download-section\"><center>Access limited<\/center><\/h2>\n<p>You are currently <strong>not logged in \/ not yet registered<\/strong>.<\/p>\n<p>In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.<\/p>\n<div style=\"text-align:center;\">\n<table style=\"width:90% !important;margin-left:5% !important;\">\n<thead>\n<tr>\n<th>Subscription<\/th>\n<th style=\"text-align:center !important;\">included<\/th>\n<th style=\"text-align:right;\">Purchase<\/th>\n<tr><\/thead>\n<tbody>\n<tr>\n<td>without<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">29,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Digital<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">27,55 \u20ac<\/td>\n<tr>\n<tr>\n<td>Expert<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">26,10 \u20ac<\/td>\n<tr>\n<tr>\n<td>Professional<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr><\/tbody>\n<\/table>\n<p><button style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-login-register-link gito-pub-reporting-abo-button\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/94859\/\" data-type=\"abo-button-login\">Register \/ book subscription<\/button><a href=\"https:\/\/industry-science.com\/en\/checkout\/?add-to-cart=94859&#038;quantity=1\" style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-reporting-abo-button\" data-type=\"abo-button-onetime\">Download for one time 29,00 \u20ac<\/a><\/p>\n<p><small>All prices include 7% VAT<\/small><\/p>\n<p><small>After purchasing access rights, you will automatically be redirected back to this page.<\/small><\/p>\n<\/div>\n<\/div>\n<\/div>\n<br>Solutions: <span class=\"gito-pub-tag-element\"><a href=\"\/en\/functions\/safety\/\">Safety<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/cyber-security\/\">cyber security<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/iiot\/\">IIoT<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/it-security\/\">IT security<\/a><\/span> <br>Industries: <span class=\"gito-pub-tag-element\"><a href=\"https:\/\/industry-science.com\/en\/industries\/information-security\/\">Information Security<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=%26%238220%3BEvery%20Company%20is%20Vulnerable%20and%20Needs%20to%20Protect%20Itself%20Appropriately%26%238221%3B - https:\/\/industry-science.com\/en\/articles\/every-company-is-vulnerable\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/every-company-is-vulnerable\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/every-company-is-vulnerable\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=%26%238220%3BEvery%20Company%20is%20Vulnerable%20and%20Needs%20to%20Protect%20Itself%20Appropriately%26%238221%3B&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Fevery-company-is-vulnerable%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/every-company-is-vulnerable\/&title=%26%238220%3BEvery%20Company%20is%20Vulnerable%20and%20Needs%20to%20Protect%20Itself%20Appropriately%26%238221%3B\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n<h2 class=\"gito-pub-frontend-post-headline\">You might also be interested in<\/h2>\n<!-- GITO_PUB_POST start flex-container -->\n<div class=\"gito-pub-flex-container\">\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/tachaid-ethical-ai\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2026\/02\/Rath_AdobeStock_629687249_everythingpossible-196x180.jpg\" alt=\"Operationalizing Ethical AI with tachAId\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Operationalizing Ethical AI with tachAId\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Operationalizing Ethical AI with tachAId<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Validating an interactive advisory tool in two manufacturing use cases<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/pavlos-rath-manakidis\/\">Pavlos Rath-Manakidis<\/a>, <a href=\"\/authors\/henry-huick\/\">Henry Huick<\/a>, <a href=\"\/authors\/bjoern-kraemer\/\">Bj\u00f6rn Kr\u00e4mer<\/a> <a href=\"https:\/\/orcid.org\/0009-0004-4659-012X\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a>, <a href=\"\/authors\/laurenz-wiskott\/\">Laurenz Wiskott<\/a> <a href=\"https:\/\/orcid.org\/0000-0001-6237-740X\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     Integrating artificial intelligence (AI) into workplace processes promises significant efficiency gains, yet organizations face numerous ethical challenges that stakeholders are often initially unaware of\u2014from opacity in decision-making to algorithmic bias and premature automation risks. This paper presents the design and validation of tachAId, an interactive advisory tool aimed at embedding human-centered ethical considerations into the development of AI solutions. It reports on a validation study conducted across two distinct industrial AI applications with varying AI maturity. tachAId successfully directs attention to critical ethical considerations across the AI solution lifecycle that might be overlooked in technically-focused development. However, the findings also reveal a central tension: while effective in raising awareness, the tool\u2019s non-linear design creates significant usability challenges, indicating a user preference for more structured, linear guidance, especially ...                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 42 | 2026 | Edition 1 | Pages 50-59 | DOI <a style=\"font-weight:bold !important;\" href=\"https:\/\/doi.org\/10.30844\/I4SE.26.1.48\" target=\"_blank\" rel=\"noopener\">10.30844\/I4SE.26.1.48<\/a><\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/intelligent-load-carrier\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_741519158-196x180.jpeg\" alt=\"Intelligent Load Carrier Management\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Intelligent Load Carrier Management\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Intelligent Load Carrier Management<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">AI-supported monitoring and reduction of losses in logistics<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/dominik-augenstein\/\">Dominik Augenstein<\/a>, <a href=\"\/authors\/lea-basler\/\">Lea Basler<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/intelligent-load-carrier\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Load carriers are essential for transporting manufactured parts in manufacturing companies. Despite their \u2018simplicity\u2019, they are usually expensive to purchase as they are manufactured expressly to fit purpose. While tracking methods such as GPS tracking can be used to prevent the loss of load carriers, this is associated with monitoring costs and presents challenges with regard to data protection as soon as the work performance of intralogistics employees is monitored. Assigning load carriers to designated clusters and monitoring these clusters provides an effective solution\u2014without drawing conclusions about employee performance. Furthermore, artificial intelligence can optimize this approach whilst also deterring the theft of load carriers.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 2 | Pages 78-84<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\" alt=\"Functional Safety and Cyber Security in the Process Industry\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Functional Safety and Cyber Security in the Process Industry\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Functional Safety and Cyber Security in the Process Industry<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">A tension between stability and agility<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/thimmo-kugele\/\">Thimmo Kugele<\/a>, <a href=\"\/authors\/claudia-nowak\/\">Claudia Nowak<\/a>, <a href=\"\/authors\/arno-goetz\/\">Arno G\u00f6tz<\/a>, <a href=\"\/authors\/alexander-lawall\/\">Alexander Lawall<\/a> <a href=\"https:\/\/orcid.org\/0000-0003-4703-6310\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Functional safety (safety) and cyber security (security) are key aspects of modern industry and technology. Safety aims to minimize risks posed by system malfunctions. This includes measures to protect people and the environment from failures and errors within systems. Security focuses on protecting systems and networks from digital attacks. The primary security objectives include ensuring confidentiality, integrity, and availability. A joint consideration of safety and security is essential for the future of the process industry, as both the physical safety and digital integrity of modern systems must be ensured. In industrial practice, this creates a field of tension: measures to enhance security can negatively impact safety and vice versa. This article analyzes relevant standards and regulations, presents key approaches for the integrated consideration of safety and security, and highlights areas of further research.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 2 | Pages 87-93<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/the-advantages-of-microservices\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/02\/AdobeStock_933903742-min-196x180.jpeg\" alt=\"The Advantages of Microservices\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"The Advantages of Microservices\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">The Advantages of Microservices<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">An examination of current literature on its application in companies<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/korvin-lemke\/\">Korvin Lemke<\/a> <a href=\"https:\/\/orcid.org\/0009-0000-4208-8053\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a>, <a href=\"\/authors\/ralph-riedel-en\/\">Ralph Riedel<\/a> <a href=\"https:\/\/orcid.org\/0000-0002-3704-8230\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     The intensive use of the term microservice calls for a theoretical analysis of the technology. Since service-oriented architecture approaches have produced rather disappointing results, the focus should be on the advantages of microservices. This article questions which principles justify the use of microservices as a system architecture. So far, some of the advantages mentioned in the examined literature have not been further explained or defined. There is also a lack of key figures for measuring success.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 1 | Pages 50-59<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/gaia-x-maturity-model_en\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/06\/Weiden-196x180.jpg\" alt=\"GAIA-X Maturity Model\u00a0\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"GAIA-X Maturity Model\u00a0\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">GAIA-X Maturity Model\u00a0<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Assessing the future viability of cross-company \u2028data exchange<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/maximilian-weiden\/\">Maximilian Weiden<\/a>, <a href=\"\/authors\/jokim-janssen\/\">Jokim Jan\u00dfen<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     In order to cope with growing customer requirements and the associated increase in complexity, companies are opening up their value chains, reducing their vertical integration and increasingly entering into collaborations. Cross-company data exchange along the supply chain is thus becoming a key component for competitiveness and the realization of customer-specific solutions. For this reason, the European Union has launched the GAIA-X project, which aims to create the next generation of data infrastructure for Europe and its companies. The GAIA-X maturity model offers an approach for classifying companies into different development stages and provides concrete requirements for further development along a predefined development path towards becoming a fully-fledged participant in the federated GAIA-X data infrastructure.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 40 | 2024 | Edition 3 | Pages 14-20<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/securear-an-ar-platform-for-industrial-manufacturing\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_677297681-min-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_677297681-min-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/04\/AdobeStock_677297681-min-196x180.jpeg\" alt=\"secureAR \u2013 An AR Platform for Industrial Manufacturing\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"secureAR \u2013 An AR Platform for Industrial Manufacturing\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">secureAR \u2013 An AR Platform for Industrial Manufacturing<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Development and testing of an AR assistance system with consideration of cyber security<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/frank-peter-schiefelbein-en\/\">Frank-Peter Schiefelbein<\/a>, <a href=\"\/authors\/stefan-sigl-en\/\">Stefan Sigl<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     With its ability to integrate digital information into the real world, augmented reality (AR) is increasingly becoming a critical success factor when it comes to safe, efficient and human-centered manufacturing. However, the implementation of an AR project poses various challenges that can hinder its ability to succeed. A clear sequence of steps for implementing this technology is therefore essential.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 40 | 2024 | Edition 2 | Pages 64-71<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n<\/div>\n<!-- GITO_PUB_POST end flex-container -->\n","protected":false},"excerpt":{"rendered":"<p>Manufacturing companies of all sizes have been a popular target for hackers and cyber criminals for years &#8211; and the trend is rising. In addition to security gaps in the IT systems, OT systems, i.e. operational technology, are increasingly being targeted by attackers in the course of digitalisation and networking. The consequence: companies should secure themselves as quickly as possible. Hans-Peter Bauer, Senior Vice President Cyber EMEA at BlackBerry, explains how this is possible. (Only in German)<\/p>\n","protected":false},"featured_media":95723,"menu_order":0,"template":"","categories":[79167,79168,79298],"tags":[75300,76478,75503],"product_cat":[3300],"topic":[79352],"technology":[67596],"knowhow":[],"industry":[79353],"writer":[],"content-type":[],"potential":[],"solution":[68055],"glossary":[],"class_list":{"0":"post-94859","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"category-design-en","7":"category-translate-en","8":"category-typeset","9":"tag-cyber-security","10":"tag-iiot","11":"tag-it-security","12":"product_cat-article","13":"topic-data-privacy","14":"technology-software-en","15":"industry-information-security","16":"solution-safety","17":"product","18":"first","19":"instock","20":"downloadable","21":"virtual","22":"sold-individually","23":"taxable","24":"purchasable","25":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM_03-2023_Interview_Bauer-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Manufacturing companies of all sizes have been a popular target for hackers and cyber criminals for years - and the trend is rising. In addition to security gaps in the IT systems, OT systems, i.e. operational technology, are increasingly being targeted by attackers in the course of digitalisation and networking. The consequence: companies should secure&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/94859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/95723"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=94859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=94859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=94859"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=94859"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=94859"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=94859"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=94859"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=94859"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=94859"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=94859"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=94859"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=94859"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=94859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}