Trending
Heat Index
 
Posts Tagged ‘Cybersecurity’
Most Recent
 
Read More
June 13, 2018

TÜV Rheinland launches global industrial Cybersecurity Centre of Excellence in Kuala Lumpur

TÜV Rheinland has launched its global Industrial Cybersecurity Centre of Excellence (CoE) based in Kuala Lumpur, Malaysia. The Centre of Excellence will address the cybersecurity needs of its industrial clients such as manufacturing companies, plant operators, energy and utility companies, transportation and transit system operators to secure their operational technology landscape.

125
 
Read More
June 5, 2018

One third of execs would pay hacker’s ransom demands instead of investing in security, report reveals

One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information security. In the UK, this figure drops to a fifth (21%) of respondents.

95
 
Read More
May 29, 2018

Centrify announces new analytics service app for the Palo Alto Networks Application Framework

Centrify, a provider of Zero Trust Security through the power of Next-Gen Access, unveiled its analytics service app for the Palo Alto Networks® Application Framework. Combining Centrify’s Analytics Service with the capabilities of the Palo Alto Networks Security Operating Platform strengthens Zero Trust Security 

90
 
Read More
May 23, 2018

More than one-third of companies employ managed security services to hunt cyber threats

Alert Logic, the provider of Security-as-a-Service solutions, announced data from Crowd Research Partners’ 2018 Threat Hunting Report that shows 84% of companies agree that threat hunting should be a top security initiative, yet 76% believe their Security Operations Centres (SOCs)

100
 
Read More
May 17, 2018

Automotive cybersecurity for connected cars

While addressing cybersecurity threats has become common practice for consumer devices such as personal computers and smart phones, cybersecurity for connected vehicles with rapidly evolving technologies and more complex attack surfaces is still going through the process of being studied and fully understood.

260
 
Read More
April 18, 2018

70% of energy security professionals concerned about ‘catastrophic failure’ from Cyberthreats, finds Tripwire

Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, today announced the results of a survey conducted by Dimensional Research examining industrial control systems (ICS) security in the energy industry.

165
 
Read More
April 4, 2018

Steel giant and gas industry partner with anomaly detection firm to protect control systems from malfunctions and cyberattacks

Rhebo supports automation companies and critical infrastructures in ensuring process continuity and cyber security in their industrial control systems (ICS) as well as network control technology. In its second financing round, the Leipzig-based technology company, founded in 2014,

115
 
Read More
April 3, 2018

Orange Cyberdefense launches new mobile decontamination terminal for USB flash drives

USB flash drives, whether they are new or used, are major sources of infection for company IT systems. They are in widespread use, particularly in certain sectors such as in industry, education and healthcare, both for sharing documents and for updating software.

100
 
Read More
March 20, 2018

The security challenge posed by the Internet of Things: Part 2

In part one of this series, we outlined the three tiers of the IoT security architecture and three key security challenges IoT devices pose. Now we will move on to explore three specific examples of the security challenges IoT deployments can pose and underline the importance of thinking strategically to head off IoT security threats, says GH Rao, president – Engineering and R&D [...]

3055
 
Read More
March 19, 2018

The security challenge posed by the Internet of Things: Part 1

Many organisations are experimenting with IoT projects, but these bring in significantly different security challenges, which can have far-reaching consequences. An appreciation of these unique challenges is important for the effective rollout of IoT.

1940
IoT LIFE LESSONS.
 
Read More
1255
FEATURED VIDEOS
 
SAP talks collaboration, vision and business value in IoT
 
 
 
 
Vanilla Plus logo
RELAX TIME

Check out on Amazon