Remove Case Study Remove Communications Remove Cybersecurity Remove Manufacturing
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Teslas have plenty of vulnerabilities, as cybersecurity researchers have recently discovered. The zero-days reveal just how many items can threaten an organization’s cybersecurity. While we’ve known about the dangers of IoT devices for a long time, plenty of cybersecurity tools still don’t sufficiently cover them.

IoT 121
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

An early case study of BPR was Ford Motor Company, which successfully implemented reengineering efforts in the 1990s to streamline its manufacturing processes and improve competitiveness. Organizations of all sizes and industries implement business process reengineering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

“The sample Stealer-as-a-Ransomware variant analyzed in this case study employs a deceptive FAKEUPDATES campaign to lure in its targets, tricking them into promptly updating their browsers. The malware communicates with the command and control servers through HTTPS. ” reads the analysis published by Zscaler.

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

A close-up of the SDV architecture The infrastructure layer This layer includes not only the vehicle but also the telco equipment, roadside units, smart city systems and similar components, as well as various backend systems of the original equipment manufacturers (OEMs).

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

The latest evolution of digital technologies, such as robotics, Internet of Things, Artificial Intelligence, high-performance computers and powerful communication networks leads self-driving cars out of an imaginary world and into our daily lives. While these technologies are progressing rapidly, the EU intends to ensure common rules.

Privacy 69
article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Threats to cryptography are generally prevented by using common cybersecurity hygiene practices defined in clear and achievable governance. Read the customer case study from a large leading financial institution. Such evidence might include audit records, past email exchanges, communication exchanges.

Risk 87