TÜV Rheinland has launched its global Industrial Cybersecurity Centre of Excellence (CoE) based in Kuala Lumpur, Malaysia. The Centre of Excellence will address the cybersecurity needs of its industrial clients such as manufacturing companies, plant operators, energy and utility companies, transportation and transit system operators to secure their operational technology landscape.
One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information security. In the UK, this figure drops to a fifth (21%) of respondents.
Centrify, a provider of Zero Trust Security through the power of Next-Gen Access, unveiled its analytics service app for the Palo Alto Networks® Application Framework. Combining Centrify’s Analytics Service with the capabilities of the Palo Alto Networks Security Operating Platform strengthens Zero Trust Security
Alert Logic, the provider of Security-as-a-Service solutions, announced data from Crowd Research Partners’ 2018 Threat Hunting Report that shows 84% of companies agree that threat hunting should be a top security initiative, yet 76% believe their Security Operations Centres (SOCs)
While addressing cybersecurity threats has become common practice for consumer devices such as personal computers and smart phones, cybersecurity for connected vehicles with rapidly evolving technologies and more complex attack surfaces is still going through the process of being studied and fully understood.
Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, today announced the results of a survey conducted by Dimensional Research examining industrial control systems (ICS) security in the energy industry.
Rhebo supports automation companies and critical infrastructures in ensuring process continuity and cyber security in their industrial control systems (ICS) as well as network control technology. In its second financing round, the Leipzig-based technology company, founded in 2014,
USB flash drives, whether they are new or used, are major sources of infection for company IT systems. They are in widespread use, particularly in certain sectors such as in industry, education and healthcare, both for sharing documents and for updating software.
In part one of this series, we outlined the three tiers of the IoT security architecture and three key security challenges IoT devices pose. Now we will move on to explore three specific examples of the security challenges IoT deployments can pose and underline the importance of thinking strategically to head off IoT security threats, says GH Rao, president – Engineering and R&D [...]
Many organisations are experimenting with IoT projects, but these bring in significantly different security challenges, which can have far-reaching consequences. An appreciation of these unique challenges is important for the effective rollout of IoT.