Remove Blog Remove Manufacturing Remove Retail Remove Webinar
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality.

IoT 77
article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Source New Manufacturing USA Yes 20,415 TECA Srl Source New Transport Italy Yes 16.7 Known records breached Zenlayer Source New Telecoms USA Yes 384,658,212 ASA Electronics Source New Engineering USA Yes 2.7 Known records breached Zenlayer Source New Telecoms USA Yes 384,658,212 ASA Electronics Source New Engineering USA Yes 2.7

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident

IT Governance

Source (New) IT services USA Yes 1,382 Worthen Industries Source 1 ; source 2 (Update) Manufacturing USA Yes 1,277 R.J. Source (New) Construction USA Yes 489 ClearVision Optical Source (New) Retail USA Yes 261 Symphony Financial, LLC. Source (New) Manufacturing USA Yes Unknown Human Events.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

TB JP Original Corp Source New Manufacturing USA Yes 1.2 TB JP Original Corp Source New Manufacturing USA Yes 1.2 TB JP Original Corp Source New Manufacturing USA Yes 1.2 TB JP Original Corp Source New Manufacturing USA Yes 1.2 TB JP Original Corp Source New Manufacturing USA Yes 1.2

article thumbnail

How IBM Planning Analytics can help fix your supply chain

IBM Big Data Hub

Having the ability to build and use models in this way is fundamental to managing supply chain and financial risk through activities like “what-if scenario planning”, as explained in this blog post. In a manufacturing, distribution or retail context, this is the supply plan. The next step is to start layering on constraints.

article thumbnail

The Week in Cyber Security and Data Privacy: 19 – 25 February 2024

IT Governance

TB Roncelli Plastics Source (New) Manufacturing USA Yes 1.6 TB Newman Ferrara Source (New) Legal USA Yes 835 GB UNITE HERE Source (Update) Professional services USA Yes 791,273 First Professional Services Source (New) Healthcare USA Yes 755 GB BS&B Safety Systems Source (New) Manufacturing USA Yes 714.9

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Source (New) Retail USA Yes 2,588,849 Keenan & Associates Source 1 ; source 2 (Update) Insurance USA Yes 1,509,616 AGC Group Source (New) Manufacturing Japan Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5 TB Four Hands Source (New) Manufacturing USA Yes 1.5