article thumbnail

Webinar: The Supply Chain Security Gap: Impacts on Connected and Embedded Device Manufacturers via Embedded Computing Design on February 9th, 2022 at 2pm Eastern

IG Guru

The post Webinar: The Supply Chain Security Gap: Impacts on Connected and Embedded Device Manufacturers via Embedded Computing Design on February 9th, 2022 at 2pm Eastern appeared first on IG GURU. Ponemon was appointed to the Advisory Committee for Online…Full Profile Rich Nass Executive Vice-President, Brand […].

article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT. Digitally signing software and firmware to ensure integrity and protect from malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

article thumbnail

Securing the Identities of Connected Cars

Thales Cloud Protection & Licensing

Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. To understand why we need this kind of hybrid approach, let us examine the use case of a manufacturing enterprise who put trust inthe added value of the joint Thales and PrimeKey solution. Use case: manufacturing enterprise.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

1) Manufacturer Protocols “Matter” First, consumers should seek to purchase Smart Devices that are Matter certified. Additionally, while most manufacturers are experts in their device domain, they are not typically familiar with IoT security needs or how to incorporate them into production.

article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

Research by the Organization of American States found cyberattacks against critical infrastructure and manufacturing are more likely to target industrial control systems than steal data. During a recent webinar , we discussed the potential impacts from a quantum-age cyberattack and the scenarios are chilling.

article thumbnail

Real-time analytics on IoT data

IBM Big Data Hub

Join SingleStore and IBM on September 21, 2022 for our webinar “ Accelerating Real-Time IoT Analytics with IBM Cognos and SingleStore ”. Supply chain optimization (in manufacturing). Join IBM and SingleStore on Sep 21, 2022 for our webinar “ Accelerating Real-Time IoT Analytics with IBM Cognos and SingleStore ”.