The German Federal IT security agency has set security levels for manufacturing companies. An organization aspiring for Level 5 (the highest level) must prove that all its suppliers and vendors in its supply chain are also certified for Level 5. This ensures consistency in security along the supply chain or value...
Usage-based insurance resonates with the industry's growing trust in data-driven risk evaluation and pricing. CerebrumX’s co-founder and COO, Sumit Chauhan delves into the economic benefits for customers and competitive advantage for insurers by enabling personalization, safety, and cost-effectiveness.
IoT is revolutionizing healthcare beyond just remote patient monitoring. The new frontiers in invasive procedures embrace IoT applications effectively. CIO Sreeni Venugopal says KIMSHEALTH takes the lead by implementing surgical sponge tracking and expanding its efforts to monitor other surgical equipment.
With our increasing reliance on digital systems and technology, the only thing that has outpaced are cyberattacks and their criticality.
This whitepaper talks about the cybersecurity trinity that executives need to leverage to protect their Endpoint security when it comes to dealing with incidents and...
Thailand-based Mitr Phol group, the world's third-largest sugar producer, is on a mission to enhance energy efficiency and achieve sustainability objectives. Kanchanavibhu discusses how the company utilizes digital technology to achieve these goals.
Toyota-Astra Motors Indonesia moves into its next phase of growth with digital innovations, including a four-stage big data implementation and an IoT-based telemetry solution to become a data-driven company that serves customers proactively.
Vulnerabilities in IoT devices often go undetected due to lack of visibility. Weak access controls and poor patching makes IoT security a persistent challenge. Besides executive-order-like regulations by governments, practitioners have to work on continuous user awareness to plug the gaps.
As more organizations encounter the amalgamation of OT and IT, they face new security challenges. The threat surface broadens with a plethora of largely unsecured devices. This poses a threat to IT. Multi-layered security with a defense-in-depth approach can mitigate the risks.
Thousands of Rackspace customers continue to face hosted Microsoft Exchange Server outages after the managed services giant took the offering offline after being affected by an unspecified security incident Thursday. Rackspace urges affected customers to at least temporarily move to Microsoft 365.
Global supply chains have been buckling under the strain of unprecedented demand and constricted effective logistics capacity. Lexmark took the issue head-on and leveraged its digital transformation journey to improve its overall supply chain management.
Lupin Ltd. has embarked upon an ambitious project, ADAPT (Accelerated Digital and Analytics Performance Transformation). ADAPT aims at digitalization and digitization of various processes, and helps harness the power of data from IoT, IIoT and data lakes.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
The Food and Drug Administration on Thursday issued revamped draft guidance providing updated and detailed recommendations for how medical device makers should address cybersecurity risk in the premarket of their products, especially as the threat landscape continues to evolve.
As CISO of publishing company Penguin Random House, Deborah Hawarth works on managing the convergence of IT, OT and IoT. A key step, she says, is ranking the risks posed by vulnerabilities so the organization can prioritize "where we're going to spend our energies and our money in terms of the fix."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.