Home cybersecurity
 

Keywords :   


Tag: cybersecurity

Intel Commits to Mitigating Automotive Cybersecurity Risks

2015-09-14 07:29:01| Agriculture - Topix.net

The board will encompass top security industry talent across the globe with particular areas of expertise in cyber-physical systems. The ASRB researchers will perform ongoing security tests and audits intended to codify best practices and design recommendations for advanced cybersecurity solutions and products to benefit the automobile industry and drivers.

Tags: automotive intel risks commits

 

ISA Security Compliance Institute Issues Update To ISASecure EDSA And SSA Cybersecurity Certifications

2015-09-03 03:33:36| oilandgasonline Home Page

The ISA Security Compliance Institute, which manages the ISASecure cybersecurity certification scheme for industrial automation and control systems (IACS), announced recently updates to certification requirements for the Embedded Device Security Assurance (EDSA) certification and System Security Assurance (SSA) certification.

Tags: issues security update institute

 
 

Is your baby monitor safe? Cybersecurity firms says many can be hacked

2015-09-02 20:23:47| Wireless - Topix.net

Several of the most popular Internet-connected baby monitors lack basic security features, making them vulnerable to even the most basic hacking attempts, according to a new report from a cybersecurity firm. The possibility of an unknown person watching their baby's every move is a frightening thought for many parents who have come to rely on the devices to keep an eye on their little ones.

Tags: baby safe monitor firms

 

Central Florida Electric Cooperative to Implement Cybersecurity Monitoring

2015-08-27 16:58:00| Transmission & Distribution World

Central Florida Electric Cooperative is using its N-Sentinel Software as a Service (SaaS) solution. read more

Tags: central florida electric monitoring

 

Properly Tackle Your Cyber-Security Vulnerabilities

2015-08-17 18:47:00| Chemical Processing

Start by getting a realistic view of weaknesses in your specific hardware and software.

Tags: properly tackle vulnerabilities cybersecurity

 

Sites : [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] next »