Remove Computer and Electronics Remove Industry Remove IoT Remove Retail
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality.

IoT 78
article thumbnail

Financial services continue to lead in cybersecurity preparedness, but chinks appear in the armor

Thales Cloud Protection & Licensing

Organizations in the finance sector manage trillions of dollars and maintain very valuable and vital electronic data, including bank account, credit card, and transaction information as well as sensitive data related to estates, wills, titles, and other matters. Malware and ransomware attacks increase.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

He has many years of cross-industry experience in consulting with clients across all major MDM and PIM technologies. I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started.

MDM 49
article thumbnail

Digital transformation examples

IBM Big Data Hub

” An example of a company that underwent a major retail transformation is Amazon, which changed the way consumers shop for everyday items. There are several examples, or case studies, of successful digital transformation across a range of different industries. (They might do so if pushed, but they are not being asked to do it).”

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse.