Cyber Security
Deeply embedded GUI solution for safety-critical IoT systems
Provider of the comprehensive X-Ware IoT Platform, Express Logic, has announced that it is deeply embedded GUIX graphical user interface run-time solution has achieved the highest level of safety certification for the International Electrotechnical Commission (IEC) 61508 SIL 4, IEC 62304 Class C, ISO 26262 ASIL D, and EN 50128 SW-SIL 4 safety standards.
The critical questions to ask EMS providers about data security
We live in a connected world. The Internet of Things (IoT), the ubiquity of data and the Fourth Industrial Revolution deliver gains in productivity and efficiency through connections across the manufacturing sector. Yet the same connections that strengthen us could also weaken us: as our shared data becomes more powerful it could prove to be our Achilles heel, and it’s the weak link in the chain that hackers are increasingly keen to ex...
Accelerating embedded system safety and security
It has been announced that Cadence Design Systems and Green Hills Software, have entered into a strategic partnership that is expected to drive embedded system safety and security. As part of the partnership, Cadence has invested about $150 million that represents an approximate 16% ownership interest in Green Hills, and Cadence CEO, Lip-Bu Tan, has joined the Green Hills Board of Directors.
LOI signed to join Charter of Trust for Cybersecurity
It has been announced that Mitsubishi Heavy Industries (MHI) signed a letter of intent to join the Charter of Trust for Cybersecurity in Tokyo, expanding the Charter's reach into Asia. The membership is expected to be concluded by the end of September, 2019. As the 17th Charter partner, MHI will be the first Asian company to become a member of the global cyber security initiative.
Healthcare safety consortium extends cyber security standards
Nonprofit public health and patient safety organisation, The Medical Device Innovation, Safety, and Security Consortium (MDISS), has announced it is developing a set of recommended practises and profiles for securing medical systems based on the normative requirements in the widely used ISA/IEC 62443 series of standards for industrial automation and control systems cyber security.
Help to manage cyber risk holistically
The cyber exposure company, Tenable, has announced that the company more than doubled its Cyber Exposure Ecosystem throughout 2018, including 43 new or enhanced technology integrations and 20 new integration partners. The ecosystem now supports a total of 50 integrations and 39 technology partners.
Vulnerability management for pinpoint cyber security
The Cyber Exposure company, Tenable, has announced the general availability of Predictive Prioritization, an offering which hopes to change how organisations tackle vulnerabilities. Predictive Prioritization enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.
Business incubator to boost security innovation in IoT
IAR Systems Group has announced that the Group is dedicating an investment fund and efforts to help grow innovative startup companies within IoT and security solutions. Through the Ymir business incubator, the Group will support companies who have new innovative ideas and high-growth potential.
Slashing theft and fraud across an operator’s device portfolio
Mobile cyber security specialist, Trustonic, has announced its new Asset Lifecycle Protection Service (ALPS) for mobile network operators. Mobile operators can now eliminate smartphone theft, fraud and trafficking, allowing them to safeguard their device investments, protect revenue and drive additional profit contribution.
Three levels of security to protect passwords
A new approach to password security has launched, with three levels of security to keep passwords private. Mycena Password Fortress is a patent-pending free to download mobile app which acts as a fortress with three levels of security within the user’s device. The app doesn’t use a master password and heralds in reinforced security with a combination of identification protocols.