Remove Computer and Electronics Remove Manufacturing Remove Meeting Remove Training
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

In the NIS Directive, the obligations that apply to an entity that falls under the scope of the NIS Directive depend on its qualification as ‘operator of essential services’ (“OES”) or ‘digital service provider’ (“DSP”): An OES is defined as a public or private entity of a type referred to in Annex II, which meets certain criteria.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

And there'd be no way to set the phone to vibrate during a meeting except by powering it off. A sophisticated set of encryption and electronics is at work inside the vehicle. As more and more automotive manufacturers start incorporating computer technology into their expensive BMWs, Mercedes Ferraris and Porsches.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

You can do what's called a replay attack by capturing the codes and replaying them, or you can use a previously successful rollover sequence to calculate the key fob code of the next car from the same manufacturer. Vamosi: In 2016 I took a two day car hacking training session at BlackHat USA in Las Vegas.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

And people gladly take your computer and run it and you have to question that but there's they're so eager to learn it and to do it. But what about something in between something like a car in 2016 I took a two day car hacking training session at BlackHat USA. And this was one year after the Jeep Cherokee remote hack.