Toyota-Astra Motors Indonesia moves into its next phase of growth with digital innovations, including a four-stage big data implementation and an IoT-based telemetry solution to become a data-driven company that serves customers proactively.
Vulnerabilities in IoT devices often go undetected due to lack of visibility. Weak access controls and poor patching makes IoT security a persistent challenge. Besides executive-order-like regulations by governments, practitioners have to work on continuous user awareness to plug the gaps.
As more organizations encounter the amalgamation of OT and IT, they face new security challenges. The threat surface broadens with a plethora of largely unsecured devices. This poses a threat to IT. Multi-layered security with a defense-in-depth approach can mitigate the risks.
Thousands of Rackspace customers continue to face hosted Microsoft Exchange Server outages after the managed services giant took the offering offline after being affected by an unspecified security incident Thursday. Rackspace urges affected customers to at least temporarily move to Microsoft 365.
Global supply chains have been buckling under the strain of unprecedented demand and constricted effective logistics capacity. Lexmark took the issue head-on and leveraged its digital transformation journey to improve its overall supply chain management.
Lupin Ltd. has embarked upon an ambitious project, ADAPT (Accelerated Digital and Analytics Performance Transformation). ADAPT aims at digitalization and digitization of various processes, and helps harness the power of data from IoT, IIoT and data lakes.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
The Food and Drug Administration on Thursday issued revamped draft guidance providing updated and detailed recommendations for how medical device makers should address cybersecurity risk in the premarket of their products, especially as the threat landscape continues to evolve.
As CISO of publishing company Penguin Random House, Deborah Hawarth works on managing the convergence of IT, OT and IoT. A key step, she says, is ranking the risks posed by vulnerabilities so the organization can prioritize "where we're going to spend our energies and our money in terms of the fix."
The White House is seeking fiscal 2023 budget increases for the Department of Health and Human Services, including a boost in funding for cybersecurity initiatives including medical device security and regulatory and enforcement efforts related to secure health data exchange.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks."
It is critical for medical device manufacturers to take a threat modeling approach early in a product's design stage, say MITRE medical device cybersecurity experts Margie Zuk and Penny Chase, co-authors of the recently released Playbook for Threat Modeling Medical Devices commissioned by the FDA.
Federal authorities are warning about seven vulnerabilities affecting a software agent used to remotely manage an array of medical devices and other connected gear. If exploited, the vulnerabilities could enable hackers to gain full control of the affected devices or alter their configurations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.