On Chinese "Spy Trains"

Schneier on Security

Congress is considering legislation that would prevent the world's largest train maker, the Chinese-owned CRRC Corporation, from competing on new contracts in the United States. News articles talk about " spy trains ," and the possibility that the train cars might surreptitiously monitor their passengers' faces, movements, conversations or phone calls. The trade war with China has reached a new industry: subway cars.

Ever wonder why information matters in train safety?

OpenText Information Management

Trains carry billions of passengers and tons of freight a year worldwide. OpenText™ customer Knorr-Bremse Group is a leading manufacturer of brakes and other components of trains, metro cars, … The post Ever wonder why information matters in train safety?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Swiss rail vehicle manufacturer Stadler hit by a malware-based attack

Security Affairs

Stadler, a Swiss manufacturer of railway rolling stock disclosed a data breach, hackers attempted to blackmail the company. International rail vehicle manufacturer, Stadler , disclosed a security breach that might have also allowed the attackers to steal company data.

Planes, Trains and Automobiles

RFID Global Solution, Inc.

Planes, Trains and Automobiles – How RFID is Transforming Transportation. It can also be used to track and control train locations and positioning, as well as railcar movement and railway conditions. RFID sensors can detect the position of a passenger train, the length of a platform, how many doors should be opened, and whether it’s safe to open them. by Diana Hage.

Shortages of talent, training haunt cybersecurity efforts

Information Management Resources

Manufacturers face serious cyber security concerns, but they continue to struggle with finding skilled professionals and might be underspending on security training. Data security Cyber security Cyber attacks

Race fans change the tires on Simon Pagenaud’s IndyCar with this augmented reality experience

DXC

This weekend, DXC offered DXC Technology 600 guests at Texas Motor Speedway a chance to find out by recreating an actual IndyCar pit stop training experience through augmented reality technology and Microsoft’s HoloLens […]. Automotive Manufacturing augmented reality DXC 600What is an IndyCar pit stop really like? Mayhem? Organized chaos? Or maybe the moment just hums along like a well-oiled machine?

FTC Settles Charges in First Case Against Mobile Device Manufacturer

Hunton Privacy

HTC”) alleging that the mobile device manufacturer “failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.” This settlement marks the FTC’s first case against a mobile device manufacturer. On February 22, 2013, the Federal Trade Commission announced that it had settled charges against HTC America, Inc. (“HTC”)

10 Approaches to Foster Innovation at Your Company

InfoGoTo

For example, Toyota’s stock-in-trade is its excellence in manufacturing. No one has yet cornered the market for 3-D printing, but there are huge opportunities to companies that figure out how to speed product delivery by enabling customers to manufacture them at home.

How organizations are navigating the COVID-19 pandemic

InfoGoTo

An executive from a global manufacturer related that, due to the nature of their work, the organization has remained operational since the pandemic’s inception. ” Training & Awareness COVID-19 crisis management mental health work from home

Executive Exchange “Round Up” – Rethinking How We Work

InfoGoTo

Our Covid-19 panel consisting of 4 customers in manufacturing, financial services and insurance, related their journeys to minimize the pandemic’s disruption to their businesses and roles. On October 5th and 6th, Iron Mountain hosted an Executive Exchange with 28 of our global customers.

Emerging Technologies vs. Disruptive Technologies

InfoGoTo

While gaming and entertainment are expected to prompt much of the virtual reality growth, automobile manufacturers, retail outlets and interior designers will benefit from this technology. Training & Awareness disrputivei technologies emerging technologies records managementRecently, there has been a lot of buzz surrounding emerging and disruptive technologies.

#ModernDataMasters: Lewis Ownes, CEO Agile Solutions

Reltio

In the early days I worked in data transformation for data into banks through digital printing – amazing that I trained to do all these elaborate hand-crafted books and ended up doing cheque books! Uncategorized B Compliance & GDPR B Consumer 360 B Customer 360 B Digital Transformation B Financial Services & Insurance B Healthcare B High-Tech & Manufacturing B IT B Business B Life Sciences B Machine Learning B Patient & Member 360 B Retail & CPG

How Microsoft Word “Protected View” Stops Information Leaks

Perficient Data & Analytics

Unfortunately, this also trains the user to click the “Enable Editing” button if he or she simply wants to view the complete document, and it is at that moment that a potential attack can succeed. Microsoft Word has long offered support for loading images and templates over the network. This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I was trained in Oracle relational databases and GUI tools to deliver group-wide Banking Systems. Uncategorized B Compliance & GDPR B Consumer 360 B Customer 360 B Digital Transformation B Financial Services & Insurance B Healthcare B High-Tech & Manufacturing B IT B Business B Life Sciences B Machine Learning B Patient & Member 360 B Retail & CPGKate Tickner, Reltio.

MDM 40

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

Related: Why diversity in training is a good thing. He came up with a new approach to testing and training the bank’s employees – and the basis for a new company, LucySecurity. Rudimentary training in which employees are required to periodically sit through a mandatory lecture on the dangers of phishing simply are cutting it in this environment, and more organizations, like the Swiss bank, are coming to that realization.

FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks

Security Affairs

The Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre (ACSC) are warning of an ongoing Avaddon ransomware campaign targeting organizations worldwide in multiple industries, including government, finance, energy, manufacturing, and healthcare.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations. These two facilities lacked nothing in terms of state-of-the-art telepresence equipment and training and testing curriculums. Ford and for its giant furniture manufacturing companies.

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Grimes, a data defense expert at cybersecurity training vendor KnowBe4. Hackers seeking to get in position to take over control or otherwise disrupt utilities are seeking paths through original equipment manufacturers, third-party vendors, and telecom providers.

CPQ + CAD? Introducing DPQ!

Role Model Software

In the manufacturing and design world, computer-aided design (CAD) is a commonly used tool. CAD software is usually very complicated That is why businesses who use CAD generally have trained professionals handling the software, someone who has put in those many hours to understand the process.

Learn. Transform. Advance.

erwin

To survive and eventually thrive in the face of radical disruption requires transformation that’s just as radical: Developing new business models, like breweries and distillers manufacturing hand sanitizer. Learn. Transform. Advance.

Business Continuity Plans Must Evolve for the Post-COVID World

InfoGoTo

The pandemic has revealed a painful downside to just-in-time inventory management as some retailers and manufacturers were caught flat-footed when their suppliers were shut down by illness or government mandate. Have a crash course security training program in place.

Cloud 99

What is Modernization?

Rocket Software

IBM i is at the core of thousands of companies around the world, from banks to retailers to manufacturing plants. I was asked as part of our Ask Rocket program to answer the question “What is Modernization?”.

Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide

Thales Cloud Protection & Licensing

It also showcases how the partner program offers comprehensive training, services and benefits. Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide. madhav. Tue, 04/06/2021 - 06:57.

Using Predictive Analytics in a Smart Factory

Perficient Data & Analytics

Update your manufacturing processes from legacy automation to a fully connected stream of data. Many manufacturing systems operate at less than full capacity ( Blanchard ). Disadvantages of PdM include the initial capital expenditure and training personnel ( Vibralign ).

Catches of the month: Phishing scams for July 2021

IT Governance

Meanwhile, the researchers found that the most attacked industries are IT, healthcare and manufacturing. Make sure your staff know how to identify and avoid scams with our Phishing Staff Awareness Training Programme.

AI and New Collar Jobs

Perficient Data & Analytics

Gartner had confirmed this by calling AI a “positive job motivator” for a number of new jobs in healthcare, public service, manufacturing, and customer service. It’s to provide an opportunity for workers from all industries, backgrounds, and skillsets to get trained and use AI to its fullest potential. Gartner stated that AI will create 2.3 Million jobs in 2020 , while eliminating 1.8 Million.

Vulnerabilities in Weapons Systems

Schneier on Security

NATO isn’t yet allowing civilians not employed by NATO or associated military contractors access to their training cyber ranges where vulnerabilities could be discovered and remediated before battlefield deployment.

Key Developments in IoT Security

Thales Cloud Protection & Licensing

The good news is that security is no longer being ignored during the manufacturing of the devices. Is there IoT security awareness training for employees who use the technology? Key Developments in IoT Security. madhav. Thu, 07/15/2021 - 10:09.

IoT 72

The hidden threats facing your intellectual property

IT Governance

For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. One such case occurred when Sinovel, a leading wind-turbine manufacturer, headhunted an employee of AMSC, an energy technology company that owned proprietary wind turbine technology. ISO 27001 certified ISMS training courses. ISO 22301 certified BCMS training courses.

Y Soft Expands NA Executive Team

Document Imaging Report

I have plans to expand our partnerships with hardware manufacturers as well as look into additional channels like independent dealer networks and distribution.”. Getting our partners up to speed and trained on all that YSoft SafeQ has to offer is a major focus.”. MFP software specialist Y Soft recently announced that its sales volume increased by 13% in its fiscal 2019 to reach $47 million.

Sales 40

Sopra Steria hit by the Ryuk ransomware gang

Security Affairs

Sopra Steria is a member of France’s Cyber Campus , a French initiative to spread cybersecurity awareness, training, and product sales. French IT outsourcer Sopra Steria hit by ‘cyberattack’, Ryuk ransomware suspected.

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

There were a massive 99 data breaches and cyber attacks in August, making it the third-biggest monthly total of the year by number of security incidents. But, by contrast, only 36,673,575 records were confirmed to have been leaked, which is the fewest we’ve recorded since May 2018.

AIs and Fake Comments

Schneier on Security

The people who create fake grass-roots organizations have always been enthusiastic early adopters of technology, weaponizing letters, faxes, emails and Web comments to manufacture the appearance of public support or public outrage.

80% of organisations affected by cyber security skills gap

IT Governance

The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%). It adds: “It will be important, if not essential, to consider the relevant educational foundations, training and professional development opportunities that support the breadth of people with potential to enter the field in order to fill the worker shortage.”.

What Is An Enterprise Architecture Kanban Board?

erwin

Skills Management : Provides a view of what skills training is required to be planned. Collaboration is vital to enterprise architecture , and one of the ways to facilitate collaboration is through an enterprise architecture Kanban board.

Artificial Neural Networks: Solving Challenges in Health Sciences

Perficient Data & Analytics

One technique that led to the broader development of ANN’s is the Backpropogation algorithm, which allows the neural network to be trained, and provides detailed insights into how changing the weights and biases across all the connections, changes the overall behavior of the network to allow the ANN to arrive at the right answer. How is an Artificial Neural Network or Deep Learning System Trained? Drug Discovery and Manufacturing.

Government survey reveals GDPR awareness is falling short

IT Governance

Of those surveyed: 36% of businesses and charities that were aware of the GDPR had created or changed policies and procedures; 21% of businesses and 10% of charities had provided additional staff training or communications; and. The industries with the least awareness were construction (25%) and production and manufacturing (27%). With significant fines for non-compliance, it is essential that staff understand the new Regulation’s requirements and have sufficient training.

GDPR 51

US CISA and FBI publish joint alert on DarkSide ransomware

Security Affairs

US agencies warn that groups employed DarkSide ransomware in attacks aimed at organizations across various Critical Infrastructure sectors, including manufacturing, legal, insurance, healthcare, and energy.

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. On the operating side, whether it’s manufacturing or energy generation, or whatever, those folks are not security experts and they don’t have a connection with IT security people.” Accounting for third-party risks is now mandated by regulations — with teeth.

Risk 141

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

Security Affairs

Key point in the OT Cybersecurity Masterplan include: Providing OT cybersecurity training to develop human capabilities Facilitating the sharing of information through an OT Information Sharing and Analysis Centre (OT-ISAC) Strengthening OT owners’ policies and processes through the issuance of an OT Cybersecurity Code of Practice (CCoP) Adopting technologies for cyber resilience through Public-Private Partnerships.