Germany has always been a place for industrial invention and innovation, reflected by the creation of the concept of “Industrie 4.0” by the German Government.
Last week saw Europe’s leading technologists involved in the digitalization of industry bought together at Hannover Messe to showcase their answers to the key question faced by industrial enterprises everywhere: How can I best get my company into shape for the digital future?
In December, hackers impersonating an executive at Interscope Records, the record label owned by Universal Music Group, managed to bypass all the latest in digital defenses with a simple email.
In a carefully tailored message, the hackers urged an executive at September Management, a music management business, and another at Cherrytree Music Company, a management and record company, to send them Lady Gaga’s stem files — files used by music engineers and producers for remixing and remastering.
When the cybersecurity industry warns of digital threats to the “internet of things,” the targets that come to mind are ill-conceived, insecure consumer products like hackable lightbulbs and refrigerators. But one group of researchers has shown how hackers can perform far more serious physical sabotage: tweaking an industrial robotic arm to cost millions of dollars worth of product defects, and possibly to damage the machinery itself or its human operator.
But today, the utilities sector is under pressure to simultaneously reduce costs and improve operational performance.
Utilities are a bit late in digital innovations than retail, banking or insurance. With energy getting on the digital bandwagon with online customer engagement, smart sensors and better use of analytics, utilities are now beginning to adopt it.
President Donald Trump has signed an executive order creating the American Technology Council, an organization tasked with modernizing the federal government’s IT systems and the digital services they offer U.S. citizens. This could be good news for the Department of Health and Human Services, a federal agency badly in need of an IT tune-up.
The first mistake companies make while trying to protect their digital assets is to believe they can be secure. “Forget aspiring to full protection. Hacking is black magic engaged in by a ton of bad guys from Russia to Romania whose citizens do not necessarily view them as the bad guys,” Eric Cornelius shared at Fusion 2017.
The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.