Remove category
Remove Cybersecurity Remove Industry Remove Manufacturing Remove Meeting
article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

NIS2 expands the original NIS Directive to cover more industry sectors, with additional risk-management measures and incident reporting obligations. NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category. Cybersecurity risk management.

article thumbnail

Proposed Changes to FDA Guidance for the Content of Premarket Submissions for Management of Cybersecurity in Medical Devices: What you Should Know

HL Chronicle of Data Protection

October is National Cybersecurity Awareness Month and the Food and Drug Administration (FDA or the agency) has been busy. On October 18, 2018, FDA issued a long-awaited draft revision to its existing guidance “ Content of Premarket Submissions for Management of Cybersecurity in Medical Devices “(premarket cybersecurity guidance).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure. The Draft Regulations will remain open for comment through August 10, 2017.

article thumbnail

U.S. Department of Transportation Issues Third Round of Guidance on Automated Vehicles

Data Matters

Rapid advances in automation have the potential to disrupt a number of sectors, perhaps none more so than the automobile industry. notes that the “traditional roles of the Federal Government; State and local governments; and private industry are well suited for addressing automation.” In particular, AV 3.0 emphasizes that DOT will.

article thumbnail

10 everyday machine learning use cases

IBM Big Data Hub

Machine learning (ML)—the artificial intelligence (AI) subfield in which machines learn from datasets and past experiences by recognizing patterns and generating predictions—is a $21 billion global industry projected to become a $209 billion industry by 2029. Then, it can tailor marketing materials to match those interests.

article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

Our recommendations are independent of any commissions, and we only recommend solutions we have personally used or researched and meet our standards for inclusion. Vulnerabilities consist of two categories: unplanned and planned. eSecurity Planet may receive a commission from vendor links. The CVSS version 3.0

Risk 109
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. In the 70s and 80s, the government was more dominant in the technology industry and didn’t have this massive internationalization of the technology supply chain. BK: So is supply chain security more of a physical security or cybersecurity problem?

Security 205