article thumbnail

At Nebraska Event, FBI Calls Out Cyber Threats To Agriculture

The Security Ledger

The FBI will host an event exploring agricultural cyber risks in Omaha, Nebraska amid growing concerns of cyber attacks on US agriculture as farms embrace precision agriculture. The post At Nebraska Event, FBI Calls Out Cyber Threats To Agriculture appeared first on The Security Ledger with Paul F.

article thumbnail

DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

The Security Ledger

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production. The post DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk appeared first on The Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 235: Justine Bone of MedSec on Healthcare Insecurity

The Security Ledger

Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture. US healthcare organizations should make a study of the HSE hack from last year and take steps to prevent a similar type of attack from occurring at their facilities. . The healthcare sector presents a particularly vexing challenge for cyber security.

article thumbnail

Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk

The Security Ledger

Related Stories DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk Episode 235: Justine Bone of MedSec on Healthcare Insecurity Episode 234: Rep. Growing Threats to agriculture. DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk.

article thumbnail

The Internet of Things (IoT): Managing the Data Tsunami

Collibra

A tsunami of new data streams offers enormous opportunities in guiding digital transformation strategies across many industries. Yet along that path there will be numerous obstacles to overcome – chiefly related to data privacy and governance. Data governance holds the key.

IoT 56
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention. But making the IoT work requires trust in the devices and the data they collect.

IoT 72
article thumbnail

Surveying Community Webs Members’ Digital Preservation Needs

Archive-It

When asked to give a brief description of the digital content survey respondents wanted to preserve long-term they mentioned the following types of content: Digitized photographs, maps, books, manuscripts, news releases, architectural drawings, survey records, genealogical records, business documents, organizational records, postcards, community newspapers, (..)