Remove Communications Remove Computer and Electronics Remove Cybersecurity Remove Manufacturing
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. manufacturers on behalf of Russian end-users, including defense contractors and other Russian government agencies.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). see also our previous blogpost on the NIS Directive).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. Common EU Security Standards. IoT Security Neglected.

IoT 109
article thumbnail

EU: NIS2 enters into force

DLA Piper Privacy Matters

On 16 January 2023, the Directive on measures for a high common level of cybersecurity across the Union (“ NIS2 ”) entered into force. Management bodies of essential and important entities will have to approve these cybersecurity risk management measures, supervise their implementation and be liable for non-compliance by the entity.

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

Simultaneously, onboard electronics evolve from individual electronic control units to high-performance computers with higher performance and simplified integration. OEMs also need to encrypt messages within a vehicle and all other communications that extend beyond it.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Table of Contents What Are the Cybersecurity Risks of 5G? What Are the Cybersecurity Risks of 5G? Here we’ll discuss the most significant risks posed by 5G, how U.S.

Risk 137
article thumbnail

White House Proposes Cybersecurity Legislation

Hunton Privacy

As we reported last week , on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress. Under the provisions, covered facilities would be mandated to develop cybersecurity plans to meet the risk-based standards. Puerto Rico and the U.S. Puerto Rico and the U.S.