The IIoT journey starts with remote telemetry

The first rule of supervisory control and data acquisition (SCADA) is that communications will fail. One challenge is rising volumes of data place increasing loads on both the main server and the communications networks connected to it.

Read more

Port53 launches an engagement platform to empower technology stakeholders

Port53 Technologies, a customer-centric cloud security, announced the launch of a platform that will empower cybersecurity professionals to shape their organisations’ threat postures at will.

Read more

Poor software quality cost the US$2.08trn in 2020

According to a new report, the cost of poor software quality (CPSQ) in the US in 2020 was approximately US$2.08 trillion (€1.69 trillion). This included poor software quality resulting from software failures, unsuccessful development projects, legacy system problems, technical debt and cybercrime enabled by exploitable weaknesses and vulnerabilities in software.

Read more

Protection for cloud-based applications from Trend Micro

Trend Micro Incorporated, the provider in cloud security, announced the availability of its Trend Micro Cloud One Application Security, a cloud native security solution for modern applications and APIs. Delivered as part of its platform, Cloud One Application Security provides code-level visibility and protection against the latest cyber threats.

Read more

Convenience or corruption? USB media and cybersecurity risk

From hard drives and flash drives to a wide range of other devices, USB media offers a fast, simple way to transport, share and store data when digital transfer isn’t possible.

Read more

What is device attestation?

As an organisation that is founded on the expertise and insights of our members, we have taken the opportunity to discuss some of the new and emerging technologies shaping our industries, and how GlobalPlatform is working to define standards that enable digital devices and services to be securely brought to market.

Read more

Network visibility now top concern for NetOps and SecOps as remote work surges

The 13th annual State of the Network global study of enterprise networking and security challenges shows that IT teams critically require better visibility into the network. The report has been released today by VIAVI Solutions, Inc.

Read more

Exploring IoT’s top five challenges through the 5 Cs – Part 2

In the part 1 of the blog, we discussed about one of the top five challenges through the 5Cs. In the second part of the blog we will be discussing about continuity, compliance, coexistence and cybersecurity.

Read more

Cybersecurity index shows the most exposed countries: Afghanistan tops the list

The new Cybersecurity Exposure Index (CEI) by password security resource PasswordManagers.co, reveals which countries are the most and least exposed to cybercrime.

Read more

IoT is transforming the enterprise: Find out how your peers are doing it

The Internet of Things (IoT) is becoming a key element of digital transformation for enterprises around the world. But companies across industries and time zones face challenges that keep them from achieving their goals and realising IoT’s maximum value, says Bill Hurley, chief marketing officer of Syniverse.

Read more

Safeguarding Industrial IoT: A rising security challenge – Part 1

The Fourth industrial revolution has unleashed a myriad of opportunities for organisations eager to leverage a new generation of connected Industrial Internet of Things (IIoT) devices and reap the rewards of enhanced data sharing, operational efficiencies, and productivity, says Trevor Daughney, vice president of product marketing at Exabeam

Read more

Will 2020 be the year home IoT cyber attacks get serious?

When it comes to disruptive change, the emergence of the smart home is driving demographic, economic, and technological advancement as never before, says David P. Maher, executive VP and chief technology officer of Intertrust. This application of IoT, where private households and the devices that run them are connected to the internet, is creating an

Read more

Global survey shows IoT security precautions failing and companies underestimate insider threats

New data from Extreme Networks Inc., a cloud-driven networking company, reveals that the Internet of Things (IoT) is “barrelling toward the enterprise, but organisations remain highly vulnerable to IoT-based attacks”.

Read more

Real-time embedded cyber visibility and security for IoT devices offered by Telit and Sternum

Telit, a global enabler of the Internet of Things (IoT), is partnering with Sternum, the multi-layered cybersecurity solution providing real-time embedded protection for IoT devices. Sternum’s solution can be built into Telit’s xE910 module family to give Telit’s customers in-depth visibility and security for their entire device fleet.

Read more

Attacks on smart supply chains and medical tech lead cyber security threats

TÜV Rheinland has released its seventh annual report on Cybersecurity Trends for 2020. In it, the Cologne, Germany-based provider of international testing, inspection and certification services, identifies attacks on smart supply chains, threats to medical equipment and weaknesses in real-time operating systems.

Read more

Thales unveils Cybels Analytics AI-based platform to detect complex cyberattacks

At the 2020 edition of the International Cybersecurity Forum (FIC), Thales is unveiling Cybels Analytics, an innovative cybersecurity platform relying on advanced artificial intelligence and Big Data analytics technologies.

Read more