article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io This article explores how nTropy successfully designed a solution leveraging Thales Luna HSM to accelerate key injection material for wearable medical devices by 20x. To learn more, read this case study.

article thumbnail

Top 10 of 2020: Our Favorite Pieces from a Weird Year

Thales Cloud Protection & Licensing

So here you have it: our list of our favorite articles from this strange year—on the topics of software licensing, digital transformation and more. In this article, McKinsey looks towards the future, with a focus on the potential upcoming advancements in the world of healthcare and technology. Healthcare’s connectivity cure?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

The methodology gained prominence with the publication of a 1990 article in the Harvard Business Review, “Reengineering Work: Don’t Automate, Obliterate,” by Michael Hammer, and the 1993 book by Hammer and James Champy, Reengineering the Corporation. BPR initiatives generally boost key performance indicators (KPIs).

40
article thumbnail

Malicious PDF Analysis

Security Affairs

Then I thought, “Why not turn a PDF analysis into an article?” ” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious.

article thumbnail

Security Affairs newsletter Round 461 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Security 105
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

The Russia Ukraine scenario, although let's not downplay the lies, that it's affecting the strife, it's causing economic damage and everything else but it is, amazingly enough, staying in this one little localized area, and everyone almost has the ability to treat this like it's a case study. What effect does that have?

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. As you browse the myriad of malicious software featured in this article, we offer tips for how best to defend against each type. As a term, crimeware encompasses much of the malware types listed in this article. Backdoors.

Phishing 104