Remove 2018 Remove Digital transformation Remove Manufacturing Remove Security
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. The Genesis of Digital Transformation.

article thumbnail

MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?

The Last Watchdog

And over the years they’ve also financed security breakthroughs – at the source-code level. These security breakthroughs have not received much mainstream attention. What they have done is proven to be wickedly effective at tracking digital assets and preserving digital rights. Baking in security.

IoT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

And, as we’ve all seen, the failure to manage digital risks can have a negative impact on the reputation, operations and market value of affected enterprises. 6 Now, more than ever in the past, we need to authenticate devices that communicate with devices and ensure their communications channels are secure. The Threat Level Is Rising.

Risk 48
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Authentic, secure patching ensures that manufacturers can mitigate security issues before cyber criminals can act.

IoT 66
article thumbnail

Keeping federal agencies safe from technology supply chain risks

CGI

Wed, 09/12/2018 - 01:43. Parts are manufactured in one country and assembled into components in another. ICT includes key technologies involved in digital transformation, such as broadband networks, the Internet of things and artificial intelligence systems. harini.kottees….

Risk 40
article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use.

IoT 85
article thumbnail

Treating cybersecurity like workplace safety

CGI

Fri, 07/06/2018 - 00:40. When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Today, agencies need to bring the same level of motivation to ensure that their data and devices are secure. premanath.puch….