Continuing its commitment to promoting shared responsibility for safe and secure IoT deployments, PTC has unveiled a Coordinated Vulnerability Disclosure (CVD) Program.
Several weeks ago Libelium was informed by IBM about some web vulnerabilities which had been found in the Meshlium Manager System.
Whilst the Internet of Things (IoT) as we understand it has been around for about a decade, for quite a lot of that period it was hard to understand how much of the conversation surrounding
Whilst the Internet of Things (IoT) as we understand it has been around for about a decade, for quite a lot of that period it was hard to understand how much of the conversation surrounding it was simply hype.
Trend Micro Incorporated, a global provider in cybersecurity solutions, released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things (IoT) related cyber attack, however they remain unprepared.
2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,
With OnCare.Acoustic (formerly known as HyGuard), Voith supports hydropower plant operators in discovering potentially dangerous incidents by detecting sound anomalies, classifying them into warnings and alarms as well as allocating them to specific equipment, which enables the derivation of information for smarter recommendations and decisions with regard to maintenance and operations.
TÜV Rheinland has launched its global Industrial Cybersecurity Centre of Excellence (CoE) based in Kuala Lumpur, Malaysia. The Centre of Excellence will address the cybersecurity needs of its industrial clients such as manufacturing companies, plant operators, energy and utility companies, transportation and transit system operators to secure their operational technology landscape.
One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information security. In the UK, this figure drops to a fifth (21%) of respondents.
Centrify, a provider of Zero Trust Security through the power of Next-Gen Access, unveiled its analytics service app for the Palo Alto Networks® Application Framework. Combining Centrify’s Analytics Service with the capabilities of the Palo Alto Networks Security Operating Platform strengthens Zero Trust Security