DE · Topics · Cybersecurity

Cybersecurity

Sponsored Content
Optimizing Security — Safeguard Your Printing Environment
Your large-format printing environment could be vulnerable to data breaches. Here's how you can address common security risks.
Designing Over-the-Air, Secure Devices
The fundamentals of IoT device security are hard to build in late in the development process, and the details do matter.
By the Numbers: The Internet of Things
Facts and figures on the Internet of Things (IoT).
Sponsored Content
Born this Way: Higher Security for High Speed Computing
IDC predicts that, by 2019, 70% of major multinational corporations with roots in the U.S. and Europe will face significant cybersecurity attacks
Sponsored Content
Develop a New HPC Cybersecurity Mindset
High-performance computing (HPC) has opened the door to many innovations; yet, it has also introduced new cybersecurity challenges, as the computational power has attracted cybercriminals, as well as malicious insiders.
Balance Cybersecurity & Collaboration
Open collaboration raises fears that the system security will be compromised, yet locking a system down hampers research and ultimately interferes with the reasons for providing computing resources.
Cybersecurity, HPC and Big Data
In the past two years, IDC’s HPC team (now called Hyperion Research) has conducted major studies on cybersecurity practices in the U.S. private sector, with special attention to the roles of HPC and big data analytics.
Sponsored Content
How IoT Is Making Security Imperative for All Embedded Software
Devices for the Internet of Things require secure embedded software. Here's what you can do to improve your code's security while reducing costs and cycle times.
Industrial Internet Consortium Releases Security Framework
The framework provides a systematic view at IIoT security.
IoT Security: Smart Measures for Smart Devices
Early integration and testing is key for safer products.
Security Frameworks to Set the IoT and IIoT in Motion
The IoT market already offers a number of solutions to prevent attacks.
Software Piracy: A Growing Epidemic
The practice exposes customers to a range of IT risks.
CeBIT Keynoter Focuses on Securing the ‘Things’ in IoT
Lessons learned from hacking the Tesla Model S are applied.
Nissan LEAF Security Flaws Exposed via Hacking
The NissanConnect EV app could be hacked via a Web interface to control individual car functions and access journey data.
Owl Computing Named Specialist ICS Security Tool Provider
The firm offers cybersecurity for industrial control systems and critical infrastructure.



Latest News

BMF Opens Lab for Testing and Manufacturing of Zirconia Veneers
Expanded service enables dentists to offer thin cosmetic dental veneers across the United States, company reports.

Continuum Powders Qualifies Reclaimed Metal Powders
As part of this collaboration, Continuum Powders has qualified its metal powders for use on specific Renishaw AM machines.

Golf Driver Powered by Altair Technology
Cleveland Golf utilized products within the Altair HyperWorks platform for its golf driver.

Carbon Unveils EPU Pro Platform
Company showcased updates at Formnext.

UpNano Unveils 3D Printer for Microparts
A newly developed printer model acts as the engine that runs the new service, offering serial production of microparts with...

Spatial Unveils Updates Across Product Portfolio
Updates focused on workflow efficiency and increased automation capabilities, company says.

All posts