Supply Chain Economics and Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of…

Cybersecurity and Data Concerns in 5G

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One…

Extend the Lifecycle of Embedded Systems with a Hypervisor

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software…

IoT: Three Types of Security

IoT: Three Types of Security

IoT security will never be confused with Fort Knox. It is very important that IoT to be secure in a way that is both technically and economically appropriate. But an IoT strategy that does not incorporate…

Identifying Compromises Through Device Profiling

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one…

[New Report] Cybersecurity for smart factories

[New Report] Cybersecurity for smart factories

Almost half (40%) of manufacturers surveyed recently by Deloitte and the Manufacturers Alliance for Productivity & Innovation (MAPI) said their operations were impacted by a cyber incident in the past 12 months, and yet one in four have not performed…

Facility Managers Guide to Building Systems and Cybersecurity

Facility Managers Guide to Building Systems and Cybersecurity

How to Assure Vendors Establish and Use a Cybersecurity Hygiene Don’t look now, but mainstream business leaders are learning that building systems may be the single biggest block of cybersecurity vulnerability in corporate America. Facility Managers,…