Brexit readiness: what can manufacturers do now?

OpenText Information Management

It’s a particularly uncomfortable and uncertain time for the UK manufacturing industry in the face of Brexit ambiguity. Manufacturing, in particular, will be seriously affected, and UK trade associations have already warned the government that uncertainty is slowing investment and leading to lay-offs in the … The post Brexit readiness: what can manufacturers do now? Business hates uncertainty (so do most people for that matter).

GDPR in manufacturing: Where to start, threats and opportunities

OpenText Information Management

Although it seems like we’ve been talking about this new legislation for a long time, companies in every sector have been slow to react, with almost a third of small UK manufacturers not even beginning GDPR preparations. … The post GDPR in manufacturing: Where to start, threats and opportunities appeared first on OpenText Blogs. There are now less than three months left until the EU General Data Protection Regulation (GDPR) comes into force.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. Additional details, including IoCs and Yara rules are available here: Cyber-Criminal espionage Operation insists on Italian Manufacturing.

Top AI trends to expect in manufacturing, agriculture and government

Information Management Resources

While it’s impossible to predict the future with certainty, technologies that incorporate AI and automation are maturing at an incredibly rapid rate across some industries. Artificial intelligence Data strategy Machine learning

What will be the effect of Brexit in the manufacturing industry?

OpenText Information Management

Last year, the UK government said that it had conducted no sectorial impact assessments of the UK’s withdrawal from the EU single market. It has since rolled back from that statement, but this has only added to the confusion and uncertainty surrounding Brexit in the Manufacturing industry. Manufacturing is one sector that will be seriously affected … The post What will be the effect of Brexit in the manufacturing industry?

UK Government Proposes IoT Security Measures

Data Breach Today

government is taking the first steps toward creating new security requirements for manufacturers to strengthen password protections and improve how vulnerabilities are reported

IoT 149

How a Manufacturing Firm Recovered from a Devastating Ransomware Attack

Dark Reading

The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened

Digital Transformation in a Global Manufacture Organization

Perficient Data & Analytics

Not long ago, the strategy of “Digital China” was announced by the Government to help empower and upgrade company competence and economics. Similarly the Indian Government launched the campaign to ensure that Government services are made available to citizens electronically through improved online infrastructure and by internet connectivity. Previously manufactures don’t have a way to label the products which is convenient and recognized by mobile or tablet devices.

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT. Securing the manufacturing process of IoT devices includes three steps: Controlling production runs to ensure product legitimacy and prevent counterfeiting.

Mandatory IoT Security in the Offing with U.K. Proposal


law mandates that manufacturers apply several security controls to their connected devices. Government IoT default password Device security Internet of things iot legislation iot manufacturers IoT security Password regulation Security Updates tech law Uk gov law uk law

IoT 87

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. IT governance and security. Privacy governance and management.

The Information Governance Conference Announces 2018 Keynote Speaker

IG Guru

Drones and related technologies continue to tangle up courtrooms – with implications on downstream information, autonomous vehicles, manufacturing, healthcare, and so much more. The post The Information Governance Conference Announces 2018 Keynote Speaker appeared first on IG Guru. Artificial Intelligence IG News InfoGovCon Information Governance Keynote #infogov Kathryn Rattigan Robinson+Cole

Meet Perficient’s Chief Strategists: Arvind Murali

Perficient Data & Analytics

We recently spoke with Arvind Murali , Data Governance Chief Strategist, to get his perspective on data governance, building data strategies to optimize business outcomes, and his life beyond the world of strategy. Then, I translate that feedback to help them build data strategy and governance to support and manage their data infrastructure. Why does data governance matter for today’s enterprises? How does implementing data governance impact businesses?

MDM 50

Huawei's Role in 5G Networks: A Matter of Trust

Data Breach Today

UK Government May Allow Chinese Manufacturer to Supply 'Noncore' Infrastructure As governments around the world continue plans to build out their nations' 5G networks, worries persist about whether Chinese manufacturers can be trusted. But the British government apparently is ready to allow Huawei to supply "noncore" parts of its network, and the Netherlands may be ready to follow suit

New TA2101 threat actor poses as government agencies to distribute malware

Security Affairs

A new threat actor tracked as TA2101 is conducting malware campaigns using email to impersonate government agencies in the United States, Germany, and Italy. A new threat actor, tracked as TA2101, is using email to impersonate government agencies in the United States, Germany, and Italy to multiple families of malware, deliver ransomware, and banking Trojans. The post New TA2101 threat actor poses as government agencies to distribute malware appeared first on Security Affairs.

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Of course, were such a hypothesis true, one might imagine that the over percentage of GDP represented by government workers would have gone *down* over the past few decades. However, as this chart shows, that’s not the case: If we’re depending on government less and less, as I hypothesize, how on earth could government employees go *up* by ten percent in the past six decades? Now let’s compare Government as a percent of GDP to private Industry.

Introducing OpenText Content Cloud for Life Sciences

OpenText Information Management

OpenText™ is thrilled to announce the launch of OpenText Content Cloud™ for Life Sciences, an innovative new offering that brings the proven productivity and governance capabilities of OpenText™ Documentum™ for Life Sciences to a cloud environment.

Cloud 68

IoT and data governance – is more necessarily better?

Information Management Resources

The development of smart devices, coupled with the incessant need to collect data for all and any reason, has contributed to a new challenge for organizations in the field of manufacturing of these types of devices in general, and analytics in particular. Internet of things Data governance Data management

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

government: selling Chinese manufactured cameras and other gear to the U.S. Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". GovernmentA complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S. Related Stories DoJ Charges Huawei Execs in Broad Indictment Spanning 10 Years of Criminal Activity Episode 165: Oh, Canada!

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Government agencies.”

Legendary Help: Powering global supply chains during a time of crisis

Rocket Software

Non-essential manufacturing has slowed down as essential services become prioritized. A Rocket customer, who provides intralogistics solutions for manufacturing, warehouse, and distribution centers, needed a solution to manage the distribution of their goods.

B2B 56

Huawei Ban: White House Budget Chief Seeks Delay

Data Breach Today

Banning Chinese Manufacturer Means 'Dramatic Reduction' in Government Suppliers The White House budget chief is seeking to delay a ban on the U.S. government using products manufactured by Huawei. In a letter seen by the Wall Street Journal, Russell T. Vought, the acting director of the Office of Management and Budget, says organizations need more time to switch suppliers

EU data governance regulation – a wave of digital, regulatory and antitrust reform begins – Part 1

Data Protection Report

On 25 November 2020, the European Commission ( EC ) published its proposed Data Governance Regulation (the DGR ), which will create a new legal framework to encourage the development of a European single market for data. What are the objectives of the Data Governance Regulation? The Data Strategy proposed the establishment of nine common European data spaces for data sharing and pooling, including health, mobility, manufacturing, financial services, energy, and agriculture.

Spigraph, Everteam & ImageFast Provide Critical Information Governance Solutions to European Market


London (UK), Paris (FR) – April 2, 2019 Spigraph, one of the leading European Value Added distributors in the capture and digital transformation market and part of Everteam Group, a leader in information governance solutions, is pleased to announce the availability of two products from the Everteam Information Governance Suite to their portfolio: and everteam.policy. We have on boarded ImageFast as our reseller for the Everteam Information Governance products.

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears


The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. Government Privacy Biometrics coronavirus COVID-19 data collection Data Privacy facial recognition GDPR surveillance state

UK Reverses Course, Bans Huawei Gear From 5G Networks

Data Breach Today

Sanctions Against Chinese Firms a Factor in Decision The British government has officially reversed course and will now ban Huawei's telecom gear from its 5G networks. sanctions against the manufacturer, goes into effect at year's end

Britain's 5G Policy Failure: No Ideal Alternative to Huawei

Data Breach Today

Western Governments Have Failed to Counter China's Move for Technology Dominance Britain's U-turn on Huawei, announcing that it will now ban the manufacturer's gear from its 5G networks, highlights this as yet unresolved problem: Years of underinvestment and policy failures have left Britain and its allies with no inexpensive, trusted alternative.

Government survey reveals GDPR awareness is falling short

IT Governance

The industries with the least awareness were construction (25%) and production and manufacturing (27%). The Cyber Security Breaches Survey 2018 from the Department for Digital, Culture, Media and Sport (DCMS) has revealed that only 38% of businesses and 44% of charities have heard of the General Data Protection Regulation (GDPR). This is a worrisome finding, as it is only a matter of months until the new Regulation is enforced.


DHS Reportedly Warns of Chinese-Made Drones Stealing Data

Data Breach Today

Drones May Be Sending Data Back to China, According to News Reports The Department of Homeland Security is warning that Chinese-made drones could be sending sensitive data back to their manufacturers, where it can be accessed by the government, according to news reports

Top 4 takeaways from the Gartner Data and Analytics Conference


This conference brought together data and analytics leaders from top industries such as government, banking, financial services, insurance, and manufacturing. Data Governance adaptive data governance Gartner

Common Ingestion Framework

Perficient Data & Analytics

May it be healthcare, retail, finance or manufacturing, everyone is at different stages in their journey to create their industry-grade, enterprise-ready Data Lake repository. Some highlights of our Common Ingestion Framework include: A metadata-driven solution that not only assembles and organizes data in a central repository but also places huge importance on Data Governance, Data Security, and Data Lineage. Big Data is the way to move forward for all enterprises today.

Reltio Cloud – Your Key to a Successful SAP S/4HANA Migration


Reltio Cloud also acts as the governance platform to address the data quality problems before S/4HANA ingestion. Business IT B Business B Customer 360 B Digital Transformation B Financial Services & Insurance B Graph B Healthcare B High-Tech & Manufacturing B IT B Life Sciences B Machine Learning B media & entertainment B Product 360 B Retail & CPG B Supplier 360 B Travel & hospitalityGuy Vorster, Principal Solutions Consultant, Reltio.

#ModernDataMasters: Mike Evans, Chief Technology Officer


It will be possible to put more emphasis on the people, process and data governance which really make MDM live and breathe.”. We teach that problem solving is at the core of MDM, and how important data governance principles are regardless of the configuration of the underpinning technology.”. Prioritise people, process and governance. Kate Tickner, Reltio.

MDM 63

Reltio Supports Apple CEO Tim Cook’s Clarion Call for Stronger US Customer Data Privacy Laws


But today modern data management solutions that include technologies like machine learning empower organizations to implement data governance and privacy initiatives at scale, and are an essential part of their overall Customer 360 data strategy. Privacy law and as Reltio customers can attest they are already ahead of the game, with Reltio governing their sensitive customer data at scale throughout their organization using master data management, graph, and machine learning technologies.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake


But that was my route into data management and going from there into MDM PIM and data governance. Product data looks very different depending on the product you are talking about and manufacturers see products very differently from the merchants. “On On the technology side you can exploit cloud services and data lake concepts which means you can receive the data in the form that say, a manufacturer might submit it, but consume it in a way that a merchant might want to.”.

MDM 46

#ModernDataMasters: Martin Squires, The Analysis Foundry


Particularly the data governance side is beginning to be seen as really important. Uncategorized B Compliance & GDPR B Consumer 360 B Customer 360 B Digital Transformation B Financial Services & Insurance B Healthcare B High-Tech & Manufacturing B IT B Business B Life Sciences B Machine Learning B Patient & Member 360 B Retail & CPGKate Tickner, Reltio.

#ModernDataMasters: Lewis Ownes, CEO Agile Solutions


If you ask people about data management and all they talk about is governance then you know they are only being driven by regulation or a concern. On the other side of things in the start up world and data driven companies, they can be purely about data and development and that is innovative as companies like FaceBook have found, often the data governance is lacking. “A In the same way if you just show up talking about governance you can stifle innovation.

Bess Myerson Starts Her Career in Government

Archives Blogs

This 1969 press conference captures the city government at its most condescendingly genteel, with Lindsay praising her “eleemosynary” work while at the same time paying tribute to her “beauty” and “winning smile.” Though derided within the Lindsay administration as something of a loose cannon, she was one its most recognizable and, as the financial crisis tainted almost every other branch of government, most beloved representatives.

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. If you or your enterprise is engaged in the energy or manufacturing sectors, cyber threat preparation and monitoring is your first line of defense against bad actors.

Episode 204: Josh Corman of CISA on securing the Vaccine Supply Chain

The Security Ledger

Joshua Corman, the Chief Strategist for Healthcare and COVID on CISA’s COVID Task Force, joins us to talk about the myriad of cyber threats facing healthcare and the vaccine distribution system and how the federal government is working to counter them.