Automating the Edge with Robotics

Search Results for: Cybersecurity

ONE Tech

ONE Tech’s proprietary algorithms power our MicroAI™ solution, which is small enough to live on a connected device. With MicroAI™,…

 

ICS, OT-targeted attacks register 2,000% increase, Mirai hits enterprise-grade hardware

Targeted cybersecurity attacks launched against Industrial Control Systems (ICS) and Operational Technology (OT) assets have gone up more than 2,000%…

 

Trusted Computing Group releases software, firmware guidelines for IoT systems

Amid growing industry interest in IoT security, the Trusted Computing Group (TCG) has released an updated set of recommendations addressing…

 

Kx announces partnership, shows revenue growth

First Derivatives’ subsidiary Kx has joined forces with Keysight Technologies to provide it with its technology for PathWave Manufacturing Analytics,…

 

NIST looking for partners to develop data security and confidentiality best practices

The National Institute of Standards and Technology is starting two projects focused on data security and confidentiality best practices, according…

 

Nozomi secures new utility customer as ransomware takes dangerous turn

New Zealand’s top power, gas, broadband and phone company Trustpower has entered a partnership with San Francisco-based Nozomi Networks to…

 

Netskope takes a $340 million round, is valued at $3 billion

Cloud access security broker Netskope Inc. last week closed a $340 million investment led by Sequoia Capital Global Equities, giving…

 

Vulnerabilities could silence thousands of GE patient monitors

In yet another incident revealing the vulnerability of networked devices, six GE Healthcare vulnerabilities were disclosed Jan. 23 by the…

 

U.K. Government puts forward regulatory IoT security guidelines for devices sold in the region

Shortly after California became the very first U.S. state to introduce a law addressing IoT security, the U.K. is now…

 

Guest opinion: Consumers have no control over connected device security; government, regulatory bodies must step in

This is a guest post by Dan Sahar, Entrepreneur and VP Product at Upstream Security. Upstream helps corporations mitigate connectivity…

Featured Edge Computing Company

Edge Ecosystem Videos

Automating the Edge

“Automating

Deploying AI Models at the Edge

“Deploying

Latest News