#
Tag Archives: Securing
By

In director Michael Mann’s 2015 film Blackhat, a major breach of security is made on a supposedly failsafe international shipping port via a humble drinks vending machine. No longer Hollywood fiction,...

By

To make sure the Industrial Internet of Things (IIoT) is as secure as it can be, it needs to be secured at the endpoint level. There’s just one problem though: what is an endpoint, anyway? A survey...

By

Syniverse Secure Global Access provides businesses with critical security as a private network isolated from the public internet. Syniverse today announced the launch of Syniverse Secure Global Access,...

By

Assessing the requirements for an IoT security strategy in the business environment needs careful attention these days. With cyber threats rife and frequent reports of security breaches to businesses big...

By

BlackBerry Limited has signed a technology and brand licensing deal for BlackBerry Secure with Punkt Tronics AG. As per the agreement Punkt will introduce a range of highly-secure products. The range will be...

By

As DistribuTECH kicks off, this is a great time to look more closely at how communications between distribution-line reclosers and a utility’s control center can work. Cisco and Eaton have developed...

By

So many acronyms to tell people “Security is not my responsibility!” Chart sourced from Forescout’s report. This week several reports came out designed to strike terror into the...

By

Establishing safety and security in automotive design goes far beyond crash test dummies. By 2022, the global automotive Internet of Things (IoT) market is expected to skyrocket to $ 155.9 billion –...

By

To fulfill the promise of IoT, own your role in IoT security. IoT – Cisco Blog ...