Eskenzi PR ad banner Eskenzi PR ad banner

The Internet of Things

Medtech breakthrough 2019

Cynerio, the leading provider of medical device and Internet of Medical Things (IoMT) security solutions announced today that their IoMT cybersecurity solution has been selected as the winner of the Healthcare Analytics Innovation Award from MedTech Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global health and medical technology market. “Cynerio won this award due to their ability to prevent cyberattacks by utilizing technology that thoroughly analyzes the medical...

Read more
Booking.com And TomTom Committed To Getting More Women Into Tech Roles.

Gillian Tans, President and CEO of Booking.com and Corinne Vigreux, Co-founder of TomTom have spoken on the need to get more women into tech roles to future proof modern companies. Both companies use AI and machine learning in all areas of their businesses and want to see more women working in these fields. Speaking on Monday 3 June at the annual FORTUNE Most Powerful Women International Summit in London, Gillian Tans said that ‘technology in...

Read more
Cybersecurity Platform Allows Firms To Provide Proof Of Compliance.

ThreatAware - the cybersecurity monitoring and compliance platform - has added a new reporting feature which provides businesses with a full audit trail on any aspect of their IT security. It allows users to create a full report on the status of their cybersecurity and record any actions they have taken - whether they are preparing for an ISO audit and want to show they are complying with security standards, to demonstrate their response to...

Read more
Positive Technologies Helps To Fix High-Risk Vulnerabilities In B&R APROL Industrial Process Automation Systems.

Experts from Positive Technologies ICS Security and Application Analysis departments found multiple vulnerabilities in 12 components of APROL industrial process automation systems made by B&R Automation (Austria). This system is used in the oil and gas industry, energy, mechanical engineering, and other industries. The most dangerous are five vulnerabilities (listed 5, 7, 8, 10, 11 in the manufacturer's notice) allowing remote attackers to run arbitrary code in the APROL system. Because vulnerable components are used...

Read more
New Vulnerabilities In Verizon Routers Expose Millions Of Consumers, According To Tenable Research.

Tenable®, Inc., the Cyber Exposure company, today announced that its research team has discovered multiple vulnerabilities in Verizon Fios Quantum Gateway routers. If exploited, the vulnerabilities would give an attacker complete control over the router and visibility into everything connected to it. Millions of these devices are currently in use in U.S. homes. The rise of the smart home has turned the humble router into a top target for cybercriminals. These latest vulnerabilities discovered by...

Read more
nCipher: New Digital Initiatives, IoT And Cloud Adoption Driving The Use Of Trusted Cryptography Revealed By 2019 Global Encryption Trends Study.

nCipher Security, the provider of trust, integrity and control for business critical information and applications, announces that as organizations embrace the cloud and new digital initiatives such as the internet of things (IoT), blockchain and digital payments the use of trusted cryptography to protect their applications and sensitive information is at an all-time high, according to the 2019 Global Encryption Trends Study from the Ponemon Institute. With corporate data breaches making the headlines on an...

Read more
GlobalPlatform And The Trusted Platform Association Collaborate On Trusted IoT.

GlobalPlatform, the standard for secure digital services and devices, has signed a memorandum of understanding (MoU) with the Trusted Platform Association, an organization which brings together Russian cybersecurity companies to create a collaborative internet of things (IoT) ecosystem that meets diverse market needs with flexible security. The joint work initiative will focus on aligning GlobalPlatform’s specifications, which standardize the secure management of digital services and devices, with existing Russian requirements and regulations. This harmonization of...

Read more
The Biometric Smart Card: Connecting The Digitally Excluded.

By Stan Swearingen, CEO of IDEX Biometrics Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m people in the UK lack the basic digital skills they need to use the internet effectively. And 4.8m people never...

Read more
Adrian Taylor

By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At the same time, DDoS attacks are on the rise, with Cisco estimating that the number of DDoS attacks exceeding 1 gigabit of traffic per second will soar to 3.1 million by 2021. While correlation does not equal causation, in this case I believe that the two are connected. There is indeed evidence to show that IoT devices are a common...

Read more
New IoT Vulnerabilities Illustrate Risks Of Connected Devices.

McAfee researchers have uncovered two new vulnerabilities within connected devices that allow hackers access to the personal lives of consumers. A vulnerability within BoxLock smart padlock enables hackers to unlock the device within a few seconds, and a vulnerability within the Mr. Coffee brand coffee maker with Wemo grants hackers access to home networks. As the Internet of Things (IoT) grows and smart devices gain popularity, McAfee warns consumers and businesses alike that cybercriminals will...

Read more
Page 2 of 4 1 2 3 4