An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the we mehr
With just a few shopping days left before Christmas, the retail frenzy is at its height. Judging from the plethora of products touted in all of the sales flyers and commercials, it seems that this is mehr
The US FDA recently published new recommendations for both manufacturers and regulators to address medical device cybersecurity. The final document, Postmarket Management of Cybersecurity in Medical D mehr
Software entrepreneurs who are developing their first time application have the luxury of building-in their software licensing and protection solution from the outset. They most likely will choose to mehr
Industrie 4.0, a.k.a. the fourth industrial revolution, is representative of the global strategic initiative to revolutionize industry by integrating digital automation, interoperability and advanced mehr
If you are a history buff, you might find this post interesting. If you are a history buff with interest in cryptography and software hacking, you may have a lot of fun with it. First the history. In mehr
When software on a consumer’s computer becomes problematic or stops working altogether, in most cases, it is simply a nuisance without significant financial or business implications. In commercial env mehr
The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce i mehr
In the past decade, the Internet has dramatically changed the way software and the corresponding licenses are delivered. As we know, the days of the CD ROM installation are long gone. Consumers today mehr
IIoT endpoint security was the leading concern of respondents to the 2018 SANS IIoT Survey: Shaping IIoT Security Concerns. The SANS Institute is a cooperative research and education organization and mehr
“Threat actors don’t have to defeat a company’s security measures, they only have to compromise a third-party supplier that it works with or relies on.” CSOonline That seems to be the case with a new mehr
Much has been written about the unbridled optimism brought on by the so called 4 th Industrial Revolution (a.k.a. Industry 4.0) and the unprecedented cyber-related risks facing manufacturers given the mehr
BSA | The Software Alliance, a global software industry advocate, recently asserted their opinion on communications legislation being considered by the Australian Government. The Telecommunications an mehr
In the past few years, high profile cyberattacks to key Infrastructure have raised serious security concerns around the globe. These are just a few of the more prominent attacks: Massive power outages mehr
In today’s ISV world, a flexible software licensing strategy is the key to successful monetization and profitability. In the past, secure hardware-based license dongles were the platform of choice for mehr
The software industry’s move towards pay-as-you-go and subscription licensing is fueled by the success of Microsoft, Adobe, Salesforce and others who have revamped their business models to take advant mehr
A recent article in SD Times gave light to the trend that more and more aspects of software development are being forced to “shift left” in the development lifecycle, meaning that the speed at which d mehr
"Bricking” is a widely used term describing an electronic device, such as a smartphone, game console, router, or tablet computer that has been rendered useless due to severe physical damage, a serious mehr
I read an interesting article recently, How Do You Create an Internet of Things Workforce?, that was published by the IEEE Computer Society. The gist of the article was that given the significant incr mehr
Turn your customers into subscribers. That’s the mantra of Zuora Inc., a leading provider of a cloud-based subscription management platform. They have coined the term “Subscription Economy ® ” which e mehr
Dieser Bildschirm reduziert den Stromverbrauch des Monitors, wenn Sie nicht auf unserer Website aktiv sind. Um die Suche fortzusetzen, bewegen Sie einfach die Maus.