Remove Computer and Electronics Remove Cybersecurity Remove Manufacturing Remove Marketing
article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line State into “Cybersecurity Valley.” and Tenable, which went public in 2018 with a market capitalization of approximately $4 billion. There’s oil in the state of Maryland – “cyber oil.”

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). see also our previous blogpost on the NIS Directive).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. IoT market growth. Common EU Security Standards.

IoT 109
article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

According to a GMI report , the global software-defined vehicle (SDV) market is expected to achieve a CAGR of 22.1% Simultaneously, onboard electronics evolve from individual electronic control units to high-performance computers with higher performance and simplified integration. between 2023 and 2032.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. They have design constraints.

IoT 77
article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). Tracking of users by mobile applications Phone manufacturers enable applications publishers to track users for advertising, statistical or technical purposes (e.g.,

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? BK: So is supply chain security more of a physical security or cybersecurity problem? National Security Agency.

Security 209