article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

1) Manufacturer Protocols “Matter” First, consumers should seek to purchase Smart Devices that are Matter certified. Additionally, while most manufacturers are experts in their device domain, they are not typically familiar with IoT security needs or how to incorporate them into production.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Co-ordination is key.

IoT 77
article thumbnail

How IBM Planning Analytics can help fix your supply chain

IBM Big Data Hub

In a manufacturing, distribution or retail context, this is the supply plan. The supply plan is typically anchored in capacity and can combine manufacturing capacity, supply capacity and labor capacity. The next step is to start layering on constraints. Then, everything comes together.

article thumbnail

erwin’s Predictions for 2021: Data Relevance Shines at the End of the Tunnel

erwin

However, even in “normal times,” business leaders need to understand how to grow, bring new products to market through organic growth or acquisition, identify new trends and opportunities, determine if new opportunities provide a return on investment, etc. Click here to learn more and register.

article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

The voluntary scheme provides a set of rules and procedures on how to certify ICT products. Every Wednesday, you’ll get a 4-minute email with: Industry news, including this weekly round-up; Our latest research and statistics; Interviews with our experts, sharing their insights and expertise; Free useful resources; and Upcoming webinars.

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Thales and IBM Consulting are working together to lead and guide the industry in how to successfully address these threats and challenges. At Thales, we’ve been hearing many customers express their concern of such risks and looked for help in how to mitigate these risks and navigate their Quantum Readiness strategy.

Risk 87