Showing 61 - 70 of 265
As Industrial Control Systems (ICS) become increasingly software-intensive and morecomplex, the traditional approaches to cybersecurity that undertake a narrow, static technical view of the system are proving to be increasingly inept in the face of new threat vectors and vulnerabilities. To...
Persistent link: https://www.econbiz.de/10012012211
Urban Mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, as well as connected and self-driving vehicles. Technological advancements often lead to new hazards and changing nature in how accidents can...
Persistent link: https://www.econbiz.de/10012012212
In December 2015, coordinated cyberattacks targeting Ukrainian power distribution systems’ information technology (IT), industrial control systems (ICS), and operational technology (OT) resulted in physical damage to Ethernet serial converters, intentional disabling of distribution facility...
Persistent link: https://www.econbiz.de/10012012213
Persistent link: https://www.econbiz.de/10012012214
Persistent link: https://www.econbiz.de/10012149073
The Equifax data breach, announced in September 2017, occupies the top 10 charts of the largest data breaches in history. While the 148 million affected persons do not bring the event to the top, but the sensitivity of the data stolen makes it one of the most impactful incidents for consumers....
Persistent link: https://www.econbiz.de/10014086633
Cybersecurity concern is becoming a key issue for trade policy.Issues of international trade policy have recently gained increased attention. Of course, restrictions on international trade regarding technology have long existed – on imports and exports, as well as on direct foreign investment...
Persistent link: https://www.econbiz.de/10012839393
Organizations today have access to vast stores of data that come in a wide variety of forms and may be stored in places ranging from file cabinets to databases, and from library shelves to the Internet. The enormous growth in the quantity of data, however, has brought with it growing problems...
Persistent link: https://www.econbiz.de/10012685315
• The rush to adopt products on the Internet of Things (IoT) before securing them will make them attractive to cyber criminals and vulnerable to cyber-incidents. • Organizations can weaken the effects of cyber-incidents by creating cybersecurity capabilities at the beginning of their market...
Persistent link: https://www.econbiz.de/10012853889
Persistent link: https://www.econbiz.de/10003768580