ETSI Open Source MANO launches Release TEN, celebrates OSM 5th anniversary
ETSI has introduced OSM Release TEN, the 11th Release of an Open-Source project which first announced its Release ZERO in 2016 with the vision of closing the gap between the traditional way of building telecom networks, and the use of cloud technologies in telcos emerging at that time.
The role of electronics manufacturers in device security
Cyber threats and attacks are a stark reality for everyone in today’s world, from organisations and manufacturers to individuals. The problem also reaches every industry, including healthcare, logistics, retail, and manufacturing. Electronics and technology writer, Devin Partida explains the role of device security.
Build a secure supply chain for asset management with ease
Security is a vital component of any system that requires the active management of asset management used in the field. Operators need to be sure that the information they have on assets in the field is valid and has not been tampered with. If not, they face risks to their business model and ability to service users properly. Sree Durbha, Director of LoRa Edge Product Management in Semtech’s Wireless and Sensing Products Group, explains.
Access management failures put organisations at risk
A proper user access management strategy can be the difference between protected data and exposed data. In the current climate, flexible remote work has become the norm — with that, the risk surrounding data integrity is rapidly increasing.
The Implications of Bring Your Own Identity
When I was seventeen, I played one of the greatest roles of my like: 'Mark Jannell'. A younger student who we’ll call 'Tim' (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to tell him. I stepped away from the lunch table for a few minutes, and as I headed back, a different friend intercepted me. By Mike Kiser, Senior Ident...
Securing OT systems against cyber-attack
With Smart Manufacturing continuing to merge the worlds of information technology (IT) and operational technology (OT), the demand for comprehensive security measures to protect OT networks is growing. For a standards-based approach, stakeholders can turn to the IEC 62443 guidelines.
Regulatory impasse within the web-scraping industry
The controversial intervention of consulting firm Cambridge Analytica in the 2016 US elections sparked a spate of heightened scrutiny in the web-scraping industry. The firm was accused of harvesting raw data from over 87 million Facebook users. The firm allegedly used the data to provide analytical assistance to the 2016 presidential campaign of President Donald Trump. Although no criminal convictions were made, the scandal sparked...
Nixu strengthens security awareness services
European cybersecurity company Nixu has started a co-operation with KnowBe4 solution, in order to train company employees continuously to identify phishing and social engineering. Over third of all cyber-attacks involve internal actors, and over third included social engineering. Many breaches result from inadequate security hygiene and a lack of attention to detail.
Fingerprint cards for next-generation biometric payments
As a second step in their announced partnership, Fingerprint Cards AB (Fingerprints) has entered into a commercial agreement (MoU) with STMicroelectronics to bring the joint platform to market. The platform improves the efficiency of the key features a of biometric system-on-card, demonstrating simple user enrolment, very high end-to-end banking transactions and matching performances.
Over half of UK businesses fall victim to cyber attacks
The utilities sector is under increasing threat from ransomware cyber attacks. More than half (53%) of IT decision makers in the sector admit that their business has been targeted by at least one cyber security attack over the last 12 months, according to new research from Veritas Technologies, a global leader in data protection, availability and insights.