Blog
Cyber security and space security
May 26, 2020
0 Comment
By Nayef Al-Rodhan
In 2014, the network of the National Oceanic and Atmospheric Administration (NOAA) was hacked by China. This event disrupted weather information and impacted stakeholders worldwide. Satellites are often highly vulnerable to cybersecurity breaches as some telemetry links are not even encrypted. Cybersecurity is defined by the International Telecommunication Unionas “the collection
Cyber Security Today – COVID app includes privacy problem, watch for suspicious spreadsheet and Mathway hacked
May 25, 2020
0 Comment
By Howard Solomon
COVID app includes privacy problem, watch for suspicious spreadsheet and Mathway hacked. Welcome to Cyber Security Today. It’s Monday May 25th. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com. To our American listeners, thanks for tuning in on this holiday. Software developers are touting the use of smartphone apps to
Cyber Security Attacks
May 25, 2020
0 Comment
By Fleur Baars
Cyber security attacks: ensuring maximum uptime and performance of your core operational processes. Fleur Baars, Head of Service Management at Prime Vision writes about getting to grips with operational technology security in an increasingly connected Courier, Express and Parcel World. “Postal and parcel service providers and leading e-commerce companies handle an
By Brad Ree
With the burgeoning market of the Internet of Things expected to have 24.1 billion active IoT devices come 2030, the world as we know it will only continue to grow more connected. Through a constant stream of new and innovative products across items like smart speakers, wearables, and connected appliances
Using replication technology to ensure cloud-based IoT security can be maintained at scale
May 21, 2020
0 Comment
By Dennis Monner
How long can today’s cloud security systems cope with the growing mass of connected devices and users, the continued expansion of the IoT, and the expectation that remote workforces will become a permanent trend? In theory, cloud security systems can scale indefinitely, but the evidence is that there comes a