Cyber Security
The solution to the epidemic of Network Security breaches
If your personal information has ever fallen victim to a large network security breach, you know it’s no laughing matter. From dating sites and social media platforms to credit card companies, health insurance companies and banks, to government agencies, no one wants their sensitive information caught in the web of a security breach.
Incident readiness and response work for cyber security
While it’s important to engage incident response during a cyber security incident, F-Secure Consulting’s global incident readiness and response offerings put equal emphasis on readiness as a strategy for mitigating the risk of cyber attacks.
Cyber protection for Israel’s water supply
Israel’s water supply came under major attacks last year by what foreign intelligence sources described as an attempt to disrupt the country’s critical infrastructure. The apparent goal of the attacks was to raise the level of chlorine in the water supply by changing the logic of the Programmable Logic Controller without raising any alarms.
Eurotech achieves IoT security PSA certification
Eurotech has announced its Multi-service IoT Edge Gateway, ReliaGATE 10-14 and Everyware Software Framework has achieved PSA certification to Level 1. This independent IoT security certification offers customers and partners standards-based compliance and will help organizations overcome barriers to global IoT adoption.
High level of physical protection for POS terminals
POS terminals (point-of-sale) are not sufficiently protected against physical attacks. Attackers can access sensitive data (such as credit card number and PIN codes) using probes or mini-drills. An additional security element in the security caps of the terminals can reliably prevent such attacks.
How the utilities industry can win the war against ransomware
Responsible for the nation’s supply of water, gas and electricity, the utilities sector is a fundamental part of our critical national infrastructure. Its importance to the day-to-day running of the country cannot be overstated. So, what happens when critical national infrastructure comes under threat of attack? By Barry Cashman, Regional Vice President UK&I, Veritas Technologies
Cloud-based SaaS solution tightens IoT security
There will be 75 billion connected devices by 2025 and right now 48% of companies have reported an IoT security breach at least once.
Whitepaper release on MEC security, first initiative in this domain
ETSI has published a whitepaper titled MEC security: Status of standards support and future evolutions written by several authors participating in MEC and other related ETSI groups. This whitepaper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Increased security for industrial networks
Paessler has announced a partnership with Rhebo to provide joint customers with all-round monitoring and increased security for their IT and OT environments. With an increase in digitisation in the industrial sector, formerly isolated production facilities are opening up to the internet and integrating with IT or becoming digitised.
Cyber security and anti-tamper protections for mission-critical intelligent systems
Wind River has announced security enhancements to Wind River Studio, a cloud-native platform for the development, deployment, operations, and servicing of mission-critical intelligent systems. Studio enables companies to meet rigorous cyber security and anti-tamper requirements, further helping secure devices and systems through development, deployment, and operations.