Dojo by BullGuard, a provider in IoT security, and BGN Technologies, the technology transfer company of Ben-Gurion University of the Negev (BGU) announced a partnership to
A new report by Juniper Research found that over 33 billion records will be stolen by cyber criminals in 2023 alone, an increase of 175% over the 12 billion records expected to be compromised in 2018, resulting in cumulative loss of over 146 billion records for the whole period.
Organisations hold disparate and unrealistic views on protecting the Industrial Internet of Things (IIoT), in which endpoints are considered to be the most vulnerable aspects, despite confusion over what actually constitutes an endpoint.
Continuing its commitment to promoting shared responsibility for safe and secure IoT deployments, PTC has unveiled a Coordinated Vulnerability Disclosure (CVD) Program.
Several weeks ago Libelium was informed by IBM about some web vulnerabilities which had been found in the Meshlium Manager System.
Whilst the Internet of Things (IoT) as we understand it has been around for about a decade, for quite a lot of that period it was hard to understand how much of the conversation surrounding
Whilst the Internet of Things (IoT) as we understand it has been around for about a decade, for quite a lot of that period it was hard to understand how much of the conversation surrounding it was simply hype.
Trend Micro Incorporated, a global provider in cybersecurity solutions, released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things (IoT) related cyber attack, however they remain unprepared.
2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,
With OnCare.Acoustic (formerly known as HyGuard), Voith supports hydropower plant operators in discovering potentially dangerous incidents by detecting sound anomalies, classifying them into warnings and alarms as well as allocating them to specific equipment, which enables the derivation of information for smarter recommendations and decisions with regard to maintenance and operations.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.