To Make the Internet of Things Safe, Start with Manufacturing

Thales eSecurity

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT.

5 Reasons to attend Cerner Health Conference 2019

OpenText Information Management

The Cerner Health Conference (CHC) 2019 is right around the corner — October 7-9, 2019 — offering three full days of healthcare education, innovative technology and networking to more than 14,000 attendees.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

Cybersecurity & Data Breaches city governments cyberattack cybersecurity educational institutions energy utilities financial institutions hospital systems hotel chains in-house counsel retail risk social media sites Telecommunications

The Third Modern Data Management Summit: Making Data Work!


Speakers represented life sciences, healthcare, manufacturing, retail, consumer goods, financial services, consulting services, and hi-tech. Ankur Gupta, Sr. Product Marketing Manager, Reltio.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake


I was educated in computer engineering but my first job was on the business side. Product data looks very different depending on the product you are talking about and manufacturers see products very differently from the merchants. “On On the technology side you can exploit cloud services and data lake concepts which means you can receive the data in the form that say, a manufacturer might submit it, but consume it in a way that a merchant might want to.”.

MDM 46

Why Self-Driving Cars Are Good for Car Rental Companies

Perficient Data & Analytics

At the 2016 Women’s Industry Network Educational Conference, Susan Lombardo, senior vice president of vehicle acquisition for Enterprise Holdings, said, “Many drivers experience new automotive technologies for the first time in rental vehicles…I have no doubt that the U.S. New partnerships with companies that are developing self-driving car technology have also been formed.

Square 9 Softworks Introduces New Director of Digital Transformation Strategies

Document Imaging Report

His experience ranges from Business Process Outsourcing, Hardware Manufacture, Document Management Software Manufacture, Document Management Reseller and Document Capture Software manufacture. Longtime Capture Industry Veteran Keith Snyder Joins Square 9. NEW HAVEN, CONN.,

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

In 2015, penetration tester Oliver Münchow was asked by a Swiss bank to come up with a better way to test and educate bank employees so that passwords never left the network perimeter.

Xerox Production Scanner Turns Heads with Breakthrough Technology and Disruptive Economics

Document Imaging Report

Under a trademark licensing agreement with Xerox Corporation, the DocuMate 6710 is manufactured and marketed by Visioneer pursuant to Xerox’s quality control standards. PLEASANTON, Calif.,

CarsBlues Bluetooth attack Affects tens of millions of vehicles

Security Affairs

Amico worked with Auto-ISAC to figure out how attackers could steal PII from vehicles manufactured by affected members. The good news for drivers is that at least manufacturers have already provided updates to make their latest models immune to the CarsBlues attack.

Emerging Technologies vs. Disruptive Technologies


While gaming and entertainment are expected to prompt much of the virtual reality growth, automobile manufacturers, retail outlets and interior designers will benefit from this technology. Regardless, businesses should be prepared and become educated on new technologies. Recently, there has been a lot of buzz surrounding emerging and disruptive technologies.

Phishing emails and malicious attachments responsible for 34% of cyber attacks

IT Governance

Financial and manufacturing organisations were equally affected by both. Email is used organisation-wide and, with targeted attacks a growing concern, it is essential that organisations build awareness and educate their employees.

FTC Recommends Steps to Improve Mobile Device Security Update Practices

Hunton Privacy

The Report is based on information the FTC obtained from eight mobile device manufacturers, and from information the Federal Communications Commission collected from six wireless carriers. Many device manufacturers fail to maintain regular records about update support decisions, patch development time, carrier testing time, deployment time or uptake rate. Manufacturers provide little information to the public about support period, update frequency or end of update support.

Department of Commerce Report on the Botnet Threat

Schneier on Security

Awareness and education are needed. Product developers, manufacturers, and infrastructure operators often lack the knowledge and skills necessary to deploy tools, processes, and practices that would make the ecosystem more resilient.

AI and New Collar Jobs

Perficient Data & Analytics

Gartner had confirmed this by calling AI a “positive job motivator” for a number of new jobs in healthcare, public service, manufacturing, and customer service. The idea behind new collar workers isn’t to have people who are skilled or educated in this industry.

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives.

80% of organisations affected by cyber security skills gap

IT Governance

The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%).

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard.

Government survey reveals GDPR awareness is falling short

IT Governance

Of the businesses surveyed, those in the finance and insurance industries had the highest levels of awareness (79%), followed by information and communications (67%) and education (52%). The industries with the least awareness were construction (25%) and production and manufacturing (27%).


More than half of consumers would consider legal action if their data was compromised during a breach

Thales eSecurity

Those across the manufacturing and utilities industries had the highest preparedness rates at 91%, while retail had the lowest across both countries at 78%. Education. Manufacturing & Utilities.


Mobile Collection: It’s Not Just for iPhones Anymore, Part Three

eDiscovery Daily

Apple, of course, registers strongly in actual smartphone sales because they sell the phone AND the operating system unlike Android systems which are fragmented among multiple phone manufacturers. Channel manufacturers, reported to be Hon Hai Precision Industry, Pegatron Corp.

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

BlueRidge AI integrates the Internet of Things, machine learning and predictive analytics to enable manufacturers to transform their operations into globally competitive operations. There’s oil in the state of Maryland – “cyber oil.”

Are We Prepared for the Rise of Automation?


A great proportion of the six million US manufacturing jobs that have disappeared over the last few decades were lost as a direct result of automation’s slow absorption of physical labor and factory work. We are barreling toward a future of automation.

Critical flaws affect Jira Service Desk and Jira Service Desk Data Center

Security Affairs

The security researchers Satnam Narang of Tenable reported that tens of thousands of installs are exposed online, the IT ticketing application is widely adopted in several sectors including the healthcare, government, education and manufacturing industry.

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

Stop treating this profession as a profitable mass education opportunity like just any other profession. What makes a cybersecurity professional is not a regular formation of education from any academia, not even the titles we are given, No.

Laserfiche Wins Gold in Best in Biz Awards 2017

Document Imaging Report

With customers in nearly every industry including government, education, financial services, manufacturing and health care, Laserfiche offers solutions tailored to organizations’ needs, and the expertise and personalized service that drive customer success. Laserfiche also provides in-person and online training, and educational and support resources such as user groups, workshops and webinars throughout the year.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Ford and for its giant furniture manufacturing companies. They’d come into our hub to get educated and attain excellent cybersecurity skills, including leadership development programs. Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations.

Square 9 Brings Encompass Conference to Nashville, TN

Document Imaging Report

Encompass 2018 offers innovative philosophies, providing renewed education on the entire Square 9 solutions portfolio, along with a strategic focus on new product development and the future direction for Square 9’s product initiatives. With three days of education networking and idea sharing, Encompass is designed to ‘change the direction of your business’. NEW HAVEN, CONN.,

How to Foster Innovation within Your Organization

Synergis Software

I had the pleasure of attending the Delaware Valley Industrial Resource Center (DVIRC) Manufacturing Summit on October 12 at The Fuge in Warminster where Valerie Gervais was a featured keynote. The “skilled workforce” issue is a major challenge for many manufacturing companies today, and St. Many people associate the application or study of human sciences like anthropology, sociology, political science, and philosophy with research and education.

Podcast Episode 112: what it takes to be a top bug hunter

The Security Ledger

Also: The Internet Society’s Jeff Wilbur talks about the new #GetIoTSmart campaign to educate device makers and the public about Internet of Things security. .

IoT 52

The Crowley Company Mourns the Death of Christopher William Crowley

Document Imaging Report

represented manufacturers of hardware and software in the photographic, graphic arts and micrographic industries. Basingstoke, United Kingdom) in 2011, Chris added manufacturing divisions to the company, as well as an international footprint. Frederick, Md., San Dimas, Ca.,

5 Digital Transformation Interests for IT Service Providers

Perficient Data & Analytics

billion was invested into US AI startups in healthcare, retail, manufacturing, marketing , and others. Large educational institutions such as Harvard and MIT have started virtual and physical classrooms to train a new workforce to support this age of AI.

Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks

IT Governance

US ICS-CERT provides links to a number of advisories from industrial-equipment manufacturers, including ABB, Rockwell and Siemens. Organizations must do better in educating teams on risk awareness.

Why Cybersecurity Will Save the Internet of Things


It is the ability of your car to keep in constant communication with the manufacturer to report any problems it may be suffering that cannot be seen. It is up to each of us to stay educated and implement cybersecurity at every level available to us in the hopes of a brighter and safer future.

IoT 56

62% of organisations unaware of the GDPR

IT Governance

The finance and insurance (79%), information or communications (67%) and education (52%) sectors have the highest awareness of the GDPR. Construction (25%) and the production and manufacturing (27%) sectors are among the least aware of the GDPR.


Pushing the Creative Buttons

Synergis Software

Each card offered a specific illustrated example mixing function, shape, manufacturing process, and material. The study also found that satisfaction with the D2C method was higher among those with a higher level of educational achievement (masters versus bachelors). Structural and mechanical engineering brings realization to design ideas. Just because engineering is grounded in physical processes and materials doesn’t make it less creative than any other design process.

Special Master Declines to Order Defendant to Use TAR, Rules on Other Search Protocol Disputes: eDiscovery Case Law

eDiscovery Daily

In this emissions test class action involving an automobile manufacturer, the plaintiffs proposed that the defendants use predictive coding/TAR, asserting that TAR yields significantly better results than either traditional human “eyes on” review of the full data set or the use of search terms.