Remove tags
article thumbnail

China-linked APT Curious Gorge targeted Russian govt agencies

Security Affairs

China-linked Curious Gorge APT is targeting Russian government agencies, Google Threat Analysis Group (TAG) warns. Google Threat Analysis Group (TAG) reported that an APT group linked to China’s People’s Liberation Army Strategic Support Force (PLA SSF), tracked as Curious Gorge , is targeting Russian government agencies.

article thumbnail

IoT: Living at the edge  

OpenText Information Management

VIPER: Well, if IoT was an emoji or an expression, it would be: (1) a cloud with legs, (2) a tornado of devices, or (3) an air-tag tracking anything (keys, dog, purse, avocado). Think about smart cities, next-generation healthcare, intelligent manufacturing, autonomous driving. You: What is IoT? Which do you think it is?

IoT 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security AI and automation are key in protecting against costly data breaches for retailers and consumer goods businesses

IBM Big Data Hub

But this growth in digital sales can come with a hefty price tag for retailers and consumer goods businesses: a much greater risk of data breaches. The manufacturing industry has fared even worse as malicious organizations may seek to disrupt supply chains or expose intellectual property, among other things.

Retail 86
article thumbnail

What Is An Enterprise Architecture Kanban Board?

erwin

Kanban derives from the just-in-time manufacturing methods that revolutionized manufacturing by focusing on what is needed to achieve a particular result and integrating the supply chain to maximize production. Therefore, an “enterprise architecture Kanban board” describes a Kanban board used within the context of EA.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

Other victims included one of France’s largest hospital systems; a French automobile manufacturer; a major French bank; companies that work with or manage networks for French postal and transportation systems; a domestic firm that operates a number of airports in France; a state-owned railway company; and multiple nuclear research facilities.

Passwords 258
article thumbnail

Use/non-use

InfoGovNuggets

This blog has from time to time focused a bit on how information is used and not used. I have also changed the categories that I am using to tag posts, with the Big Three: Information, Governance, and Compliance. Second crash of the new Boeing jet leads to grounding in some countries.

article thumbnail

Asset lifecycle management strategy: What’s the best approach for your business?

IBM Big Data Hub

Many industries rely on CMMS as a component of EAM, including manufacturing, oil and gas production, power generation, construction and transportation. Radio frequency identifier tags (RFID): RFID tags broadcast information about the asset they’re attached to using radio-frequency signals and Bluetooth technology.