article thumbnail

News Alert: Swissbit introduces small-capacity memory for IIoT, smart city applications

The Last Watchdog

Typical applications include green IIoT technologies like charging stations, smart meters, and PV inverters, for which only a small amount of memory is required to run boot software or to communicate with cloud applications. The proliferation of IIoT technologies is particularly evident in smart cities. Westford, Mass., 2 and 2.5”

IoT 184
article thumbnail

Industrial cybersecurity: know the biases that can derail collaboration between OT and IT

Cisco Security

Industrial cybersecurity requires the same sort of partnership, in this case between the operational technology (OT) and information technology (IT) teams. The Wannacry ransomware attack targeted workstations running Windows XP, introduced in 2001. Cybersecurity designed for the industrial IoT. How do OT and IT differ?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. Cornell is the chief technology officer at the application security firm Denim Group. Oil and water. I visited with Dan Cornell at Black Hat USA 2018. Here are a few big takeaways: DX driver.

article thumbnail

The Cybersecurity Risks of Bluetooth

SecureWorld News

Bluetooth has been around since 1994 as a wireless connectivity specification, but the first mobile phones did not appear with basic Bluetooth services until 2001. Therefore, be warned: if you connect to these semi-public devices, you may need to re-pair your device when your flight is complete due to limitations in the technology.

Risk 77
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

AES or the Advanced Encryption Standard was adopted in 2001 by the US National Institute of Standards and Testing (NIST) as the standard for symmetric encryption. While less computationally constrained than IoT, mobile devices constrain computations to avoid consuming power and draining battery life.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Today the nonprofit Volatility Foundation is a top digital forensics vendor because of its innovative memory forensics technology. ProDiscover launched in 2001 to help public and private organizations solve digital crimes. Investigators know Volatility for its tools that analyze runtime states using RAM data. ProDiscover.

Software 136
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. AllegisCyber Capital. Evolution Equity Partners. EEP Investments.