2023 Omnibus Bill: New Chapter for Medical Device Security?
By Shlomit Cymbalista, Head of Regulation at Sternum IoT I don’t know about you all, but I have been on an emotional rollercoaster watching the US government dangle the…
By Shlomit Cymbalista, Head of Regulation at Sternum IoT I don’t know about you all, but I have been on an emotional rollercoaster watching the US government dangle the…
WirelessCar provides digital services for connected cars, including in the areas of connectivity, journey intelligence, safety and security, electric vehicles, and shared mobility. To support a global fleet…
Learn how Innovyze, an Autodesk company, reduced development time from years to months and deployment time from months to days using AWS. Autodesk provides critical design, make, and operate software…
Water is one of the world’s most precious resources — and, unfortunately, there simply isn’t enough to go around. Already, 2.3 billion people live in water-stressed countries; that number…
There are more than 10 billion IoT devices worldwide, and this number is projected to reach about 30 billion by 2030. Connectivity has countless applications for consumers and businesses alike. New…
Which are the biggest challenges currently faced by the different industries? The biggest challenges we see with our customers are on one hand the convergence between IT and OT (Operational…
Airports are under tremendous pressure to secure highly diverse and dispersed networks from cyberattacks and incidents that could disrupt passenger services and operations. While this global airport was not directly…
Are you looking for ways to improve the reliability and efficiency of your equipment motors? Industrial equipment, such as compressors, spindles, or water pumps, produces different vibrations during operation. Some…
A joint research project has started with the aim of improving the energy efficiency of CERN’s cooling and ventilation infrastructure by up to 15%. The results of what can be…
OT-connected assets are opening up industrial networks to a vast, advanced, and lucrative cyberthreat landscape for cybercriminals to exploit. Extending zero-trust frameworks to OT environments will ensure more secure, resilient,…