Filter zurücksetzen × solrutimaco Suchergebnisse 1 - 14 von 14 Ergebnisse filtern News - Blog 14. Juni 2022 Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern? Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um. Solution Protected eHealth Devices Enabling the exchange of health data is a vital enabler of more efficient health care delivery. However, in addition to the clinical benefits, the proliferation of connected medical IoT devices come with security and privacy risks becoming more prevalent. Solution eHealth eHealth- Building Trust in a Connected Society Digital transformation has led to innovations such as telemedicine and remote patient monitoring. This has steered healthcare providers to rethink their approach to ensuring that sharing of patient data is met with adequate connected platform and device security. Solution Transition to Digital Manufacturing Solution Automotive Trust Anchor Securing the most valuable Assets in the Automobile Life Cycle Solution Cryptographic Identity for Components (Automotive) Vehicles can no longer be seen as just a mechanical system - they embed dozens of electronic control units, safety components and infotainment devices. If these components are manufactured without defenses, a hacker might find ways to manipulate vehicular communications by interception. Solution Automotive & Integrated Mobility Connecting and Securing your Journey The automotive industry is undergoing a radical change- from private transport to integrated, autonomous or shared mobility. Solution Cryptographic Identity for Components (Manufacturing) A final good may contain the products (or ‘components’) of several different manufacturers. Many of them are connected devices with direct or indirect access to the IoT and with onboard software and firmware. Solution Security of IoT Components Protecting IoT Components & Devices with Key Injection Solution Produktion & IoT Security by Design – Improving IoT security at the point of manufacture. Given the interconnected nature of the industry, cyberattacks can be far more extensive than before and manufacturers and supply networks need to be prepared. News - Blog 24. Nov. 2021 Understanding the Role of Hardware Security Modules in Digital Identities for Machines Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches. News - Blog 24. Sep 2021 Understanding Supply Chain Attacks - What You Need to Know Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages. News - Blog 24. Sep 2021 Understanding Supply Chain Attacks - How to Protect Your Supply Supply chain attacks threatened the interconnectedness of global markets. It is common for multiple customers to rely on the same supplier. Therefore, a single cyberattack could potentially have a large-scale national or cross-border impact. News - Blog 01. Juni 2021 Top Security and Risk Trends implications on Cybersecurity Architecture Gartner recently published their 2021 cyber security report that shows important risk trends in cybersecurity. This article discusses what implications these trends have on cybersecurity architecture. × Filter zurücksetzen