IoT to the Domestic Manufacturing Rescue

RFID Global Solution, Inc.

The list of industries that tech has transformed over time is long and wide; healthcare, business, education, communication, and transportation to name a few. One area that has seen bursts of technological change over the last 100 years is manufacturing.

To Make the Internet of Things Safe, Start with Manufacturing

Thales eSecurity

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Reasons to attend Cerner Health Conference 2019

OpenText Information Management

The Cerner Health Conference (CHC) 2019 is right around the corner — October 7-9, 2019 — offering three full days of healthcare education, innovative technology and networking to more than 14,000 attendees.

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

Cybersecurity & Data Breaches city governments cyberattack cybersecurity educational institutions energy utilities financial institutions hospital systems hotel chains in-house counsel retail risk social media sites Telecommunications

The Third Modern Data Management Summit: Making Data Work!


Speakers represented life sciences, healthcare, manufacturing, retail, consumer goods, financial services, consulting services, and hi-tech. Ankur Gupta, Sr. Product Marketing Manager, Reltio.

Why Self-Driving Cars Are Good for Car Rental Companies

Perficient Data & Analytics

At the 2016 Women’s Industry Network Educational Conference, Susan Lombardo, senior vice president of vehicle acquisition for Enterprise Holdings, said, “Many drivers experience new automotive technologies for the first time in rental vehicles…I have no doubt that the U.S. New partnerships with companies that are developing self-driving car technology have also been formed.

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

Security Affairs

The group hit entities in several industries, including the gaming, healthcare, high-tech, higher education, telecommunications, and travel services industries. Victims operate in the Banking/Finance, Construction, Defense Industrial Base, Government, Healthcare, High Technology, Higher Education, Legal, Manufacturing, Media, Non-profit, Oil & Gas, Petrochemical, Pharmaceutical, Real Estate, Telecommunications, Transportation, Travel, and Utility. .

Square 9 Softworks Introduces New Director of Digital Transformation Strategies

Document Imaging Report

His experience ranges from Business Process Outsourcing, Hardware Manufacture, Document Management Software Manufacture, Document Management Reseller and Document Capture Software manufacture. Longtime Capture Industry Veteran Keith Snyder Joins Square 9. NEW HAVEN, CONN.,

Plustek Expands Scanner Portfolio, New Workgroup Scanner Speeds Digital Transformation

Document Imaging Report

Plustek designed the PS3180U for healthcare, financial, legal, government agencies, education, construction, manufacturing, document management or any digital transformation task. Plustek announces the SmartOffice PS3180U document scanner.

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

In 2015, penetration tester Oliver Münchow was asked by a Swiss bank to come up with a better way to test and educate bank employees so that passwords never left the network perimeter.

Xerox Production Scanner Turns Heads with Breakthrough Technology and Disruptive Economics

Document Imaging Report

Under a trademark licensing agreement with Xerox Corporation, the DocuMate 6710 is manufactured and marketed by Visioneer pursuant to Xerox’s quality control standards. PLEASANTON, Calif.,

CarsBlues Bluetooth attack Affects tens of millions of vehicles

Security Affairs

Amico worked with Auto-ISAC to figure out how attackers could steal PII from vehicles manufactured by affected members. The good news for drivers is that at least manufacturers have already provided updates to make their latest models immune to the CarsBlues attack.

FTC Recommends Steps to Improve Mobile Device Security Update Practices

Hunton Privacy

The Report is based on information the FTC obtained from eight mobile device manufacturers, and from information the Federal Communications Commission collected from six wireless carriers. Many device manufacturers fail to maintain regular records about update support decisions, patch development time, carrier testing time, deployment time or uptake rate. Manufacturers provide little information to the public about support period, update frequency or end of update support.

Emerging Technologies vs. Disruptive Technologies


While gaming and entertainment are expected to prompt much of the virtual reality growth, automobile manufacturers, retail outlets and interior designers will benefit from this technology. Regardless, businesses should be prepared and become educated on new technologies. Recently, there has been a lot of buzz surrounding emerging and disruptive technologies.

Phishing emails and malicious attachments responsible for 34% of cyber attacks

IT Governance

Financial and manufacturing organisations were equally affected by both. Email is used organisation-wide and, with targeted attacks a growing concern, it is essential that organisations build awareness and educate their employees.

AI and New Collar Jobs

Perficient Data & Analytics

Gartner had confirmed this by calling AI a “positive job motivator” for a number of new jobs in healthcare, public service, manufacturing, and customer service. The idea behind new collar workers isn’t to have people who are skilled or educated in this industry.

Department of Commerce Report on the Botnet Threat

Schneier on Security

Awareness and education are needed. Product developers, manufacturers, and infrastructure operators often lack the knowledge and skills necessary to deploy tools, processes, and practices that would make the ecosystem more resilient.

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives.

80% of organisations affected by cyber security skills gap

IT Governance

The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%).

Government survey reveals GDPR awareness is falling short

IT Governance

Of the businesses surveyed, those in the finance and insurance industries had the highest levels of awareness (79%), followed by information and communications (67%) and education (52%). The industries with the least awareness were construction (25%) and production and manufacturing (27%).


GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

BlueRidge AI integrates the Internet of Things, machine learning and predictive analytics to enable manufacturers to transform their operations into globally competitive operations. There’s oil in the state of Maryland – “cyber oil.”

More than half of consumers would consider legal action if their data was compromised during a breach

Thales eSecurity

Those across the manufacturing and utilities industries had the highest preparedness rates at 91%, while retail had the lowest across both countries at 78%. Education. Manufacturing & Utilities.


Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard.

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

Stop treating this profession as a profitable mass education opportunity like just any other profession. What makes a cybersecurity professional is not a regular formation of education from any academia, not even the titles we are given, No.

Laserfiche Wins Gold in Best in Biz Awards 2017

Document Imaging Report

With customers in nearly every industry including government, education, financial services, manufacturing and health care, Laserfiche offers solutions tailored to organizations’ needs, and the expertise and personalized service that drive customer success. Laserfiche also provides in-person and online training, and educational and support resources such as user groups, workshops and webinars throughout the year.

Are We Prepared for the Rise of Automation?


A great proportion of the six million US manufacturing jobs that have disappeared over the last few decades were lost as a direct result of automation’s slow absorption of physical labor and factory work. We are barreling toward a future of automation.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Ford and for its giant furniture manufacturing companies. They’d come into our hub to get educated and attain excellent cybersecurity skills, including leadership development programs. Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations.

Critical flaws affect Jira Service Desk and Jira Service Desk Data Center

Security Affairs

The security researchers Satnam Narang of Tenable reported that tens of thousands of installs are exposed online, the IT ticketing application is widely adopted in several sectors including the healthcare, government, education and manufacturing industry.

Square 9 Brings Encompass Conference to Nashville, TN

Document Imaging Report

Encompass 2018 offers innovative philosophies, providing renewed education on the entire Square 9 solutions portfolio, along with a strategic focus on new product development and the future direction for Square 9’s product initiatives. With three days of education networking and idea sharing, Encompass is designed to ‘change the direction of your business’. NEW HAVEN, CONN.,

Mobile Collection: It’s Not Just for iPhones Anymore, Part Three

eDiscovery Daily

Apple, of course, registers strongly in actual smartphone sales because they sell the phone AND the operating system unlike Android systems which are fragmented among multiple phone manufacturers. Channel manufacturers, reported to be Hon Hai Precision Industry, Pegatron Corp.

How to Foster Innovation within Your Organization

Synergis Software

I had the pleasure of attending the Delaware Valley Industrial Resource Center (DVIRC) Manufacturing Summit on October 12 at The Fuge in Warminster where Valerie Gervais was a featured keynote. The “skilled workforce” issue is a major challenge for many manufacturing companies today, and St. Many people associate the application or study of human sciences like anthropology, sociology, political science, and philosophy with research and education.

Podcast Episode 112: what it takes to be a top bug hunter

The Security Ledger

Also: The Internet Society’s Jeff Wilbur talks about the new #GetIoTSmart campaign to educate device makers and the public about Internet of Things security. .

IoT 52

The Crowley Company Mourns the Death of Christopher William Crowley

Document Imaging Report

represented manufacturers of hardware and software in the photographic, graphic arts and micrographic industries. Basingstoke, United Kingdom) in 2011, Chris added manufacturing divisions to the company, as well as an international footprint. Frederick, Md., San Dimas, Ca.,

Pushing the Creative Buttons

Synergis Software

Each card offered a specific illustrated example mixing function, shape, manufacturing process, and material. The study also found that satisfaction with the D2C method was higher among those with a higher level of educational achievement (masters versus bachelors). Structural and mechanical engineering brings realization to design ideas. Just because engineering is grounded in physical processes and materials doesn’t make it less creative than any other design process.

Why Cybersecurity Will Save the Internet of Things


It is the ability of your car to keep in constant communication with the manufacturer to report any problems it may be suffering that cannot be seen. It is up to each of us to stay educated and implement cybersecurity at every level available to us in the hopes of a brighter and safer future.

IoT 54

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Let’s take a look at some detail: Ahh… Education. As local governments have taken over the once Federally run education system, payroll there has skyrocketed (has performance? Now, education is, in the main, a government enterprise.

5 Digital Transformation Interests for IT Service Providers

Perficient Data & Analytics

billion was invested into US AI startups in healthcare, retail, manufacturing, marketing , and others. Large educational institutions such as Harvard and MIT have started virtual and physical classrooms to train a new workforce to support this age of AI.

62% of organisations unaware of the GDPR

IT Governance

The finance and insurance (79%), information or communications (67%) and education (52%) sectors have the highest awareness of the GDPR. Construction (25%) and the production and manufacturing (27%) sectors are among the least aware of the GDPR.


Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks

IT Governance

US ICS-CERT provides links to a number of advisories from industrial-equipment manufacturers, including ABB, Rockwell and Siemens. Organizations must do better in educating teams on risk awareness.

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales eSecurity

We need to encourage manufacturers and suppliers to create “trusted” products that are secure and come from secure supply chains. This will be an ongoing challenge to address but continued education and awareness should drive suppliers to deliver more secure solutions based on customer demand.