Answering IoT Security Questions for CISOs

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 04 Oct 2019 16:17:47 +0000

Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices. It might leave CISOs with a lot of questions about how this newer, growing attack vector could impact their business. We hope to answer…

The post Answering IoT Security Questions for CISOs appeared first on .

Read more

Gartner Tech Trends Revisited – On Track with Rapid Rise in Demand for Industrial Edge Data Centers

Credit to Author: Vincenzo Salmeri| Date: Mon, 30 Sep 2019 15:30:00 +0000

Earlier this year, Gartner outlined its top 10 strategic technology trends and many of them center on growing industrial edge data centers investments. This should not come as a surprise… Read more »

The post Gartner Tech Trends Revisited – On Track with Rapid Rise in Demand for Industrial Edge Data Centers appeared first on Schneider Electric Blog.

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Credit to Author: Christopher Boyd| Date: Tue, 24 Sep 2019 17:19:23 +0000

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Read more

Where Are You on the Maintenance Modernization Spectrum?

Credit to Author: Mark Pacelle| Date: Fri, 20 Sep 2019 06:45:00 +0000

As the Industry 4.0 digitization trend spreads its influence across global manufacturing environments, one of the areas poised to benefit the most is asset maintenance. Traditional maintenance strategies have lacked… Read more »

The post Where Are You on the Maintenance Modernization Spectrum? appeared first on Schneider Electric Blog.

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

As the Automotive Industry Embraces e-Mobility Services and Connected Vehicles, IT Infrastructure Has to Adjust

Credit to Author: Reiner Manger| Date: Thu, 08 Aug 2019 14:18:52 +0000

According to McKinsey & Company, nearly 100 million lines of software code are needed to control and operate the subsystems that make up a modern automobile. By 2030 that software… Read more »

The post As the Automotive Industry Embraces e-Mobility Services and Connected Vehicles, IT Infrastructure Has to Adjust appeared first on Schneider Electric Blog.

Read more