Internet of Things Security

October 15, 2018

The Internet of Things is the interconnectedness of devices via the Internet. Watches, coffee machines, refrigerators, thermostats, and cars, these once offline items are quickly speaking to the Internet, driving technological innovation. Composed of Internetenabled hardware, these Things perform commonplace computing tasks, although these devices can now speak to, and receive instructions from, the Internet.

Spotlight

Obrela Security Industries

Obrela Security Industries (OSI) provides enterprise-class professional and managed IS services to assess and manage information risk in complex enterprise environments. Engineered to offer scalable solutions, from simply providing vendor-independent “advisor” services to completely outsourcing the security operations involved on a long-term basis, OSI has the vision to deliver Leveled Managed IS backed with Insurance, allowing for the highest, complete and most robust protection that clients can get for money, today.

OTHER WHITEPAPERS
news image

Break Free From the Iron Triangle

whitePaper | April 16, 2020

The Iron Triangle or, as it is more commonly known, the project management triangle has influenced project teams for years. Summed up as “fast, good, or cheap.pick two,” the concept asserts that there are firm boundaries on what is possible to produce. The triangle metaphor implies there is no way to provide goods or services that are simultaneously on budget, on time, and of high quality because of the competing nature of these priorities.

Read More
news image

Towards the engineering of trustworthy AI applications for critical systems

whitePaper | October 26, 2022

An accident that will leave its mark. Yesterday morning, Mrs. D., an employee of the Pharma4.0 factory in Valenciennes, had her right wrist broken by an InCobot handling robot during an ordinary operation that until now had never caused any problems. In this factory, the operation called “pick and place” of cough syrup bottles is performed jointly by human operators and robotic arms in the same work area, and this on many stations.

Read More
news image

The Complete Cloud Native Security Platform

whitePaper | August 16, 2020

Unleash the full potential of your cloud native transformation and accelerate innovation with the confidence that your cloud native applications are secured from start to finish, at any scale. Aqua Platform protects your entire stack, on any cloud, across VMs, containers, and serverless. Accelerate development by detecting security issues in your artifacts early and shortening time to remediate. «Shift left» security into the CI/CD pipeline, get full visibility into the security posture of your pipeline and reduce the attack surface before application deployment.

Read More
news image

The use of Artificial Intelligence to Combat Public Sector Fraud

whitePaper | February 21, 2020

The information contained in the International Public Sector Fraud Forum documentation and training is subject to Crown Copyright 2020. The information should not be published or distributed in any way that could undermine the values and aims of the International Public Sector Fraud Forum. This content consists of material which has been developed and approved by the International Public Sector Fraud Forum.

Read More
news image

Unlocking Value from Artificial Intelligence in Manufacturing

whitePaper | December 28, 2022

This document is published by the World Economic Forum as a contribution to a project, insight area or interaction. The findings, interpretations and conclusions expressed herein are a result of a collaborative process facilitated and endorsed by the World Economic Forum but whose results do not necessarily represent the views of the World Economic Forum, nor the entirety of its Members, Partners or other stakeholders.

Read More
news image

TOP 5 REASONS TO PUT PRIVILEGE FIRST

whitePaper | July 20, 2020

Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach. Organizations must have a strategy in place to manage and monitor privileged access, as well as detect and respond to threats if they’d like to mitigate risk from today’s advanced attacks. Your application stack and infrastructure is likely quite complex and it can be hard to identify which assets are the most sensitive. And there is a never-ending supply of vendors knocking down your door competing for your time and attention. These two realities make it increasingly difficult to identify which security project to tackle next. When thinking about how to prioritize, it is advantageous to take a step back and think about your businesses goals, albeit in a slightly different way: try to envision what you would be looking for if you were an external attacker or malicious insider looking to steal sensitive data, commit Ransomware, or use your infrastructure for illicit cryptomining.

Read More

Spotlight

Obrela Security Industries

Obrela Security Industries (OSI) provides enterprise-class professional and managed IS services to assess and manage information risk in complex enterprise environments. Engineered to offer scalable solutions, from simply providing vendor-independent “advisor” services to completely outsourcing the security operations involved on a long-term basis, OSI has the vision to deliver Leveled Managed IS backed with Insurance, allowing for the highest, complete and most robust protection that clients can get for money, today.

Events