BUSINESS > Production > Manufacturing


« Back to News

2015-11-11

Conditional Clearance For Hackers To Test Automotive & Healthcare Security

U.S. Researchers will be able to look for flaws in software running on cars and medical devices without fearing legal action.

2015-10-06

Russian Scientists Create Cockroach Robo-Spy

RoboRoach: Biologically inspired engineering to create an artificial organism which can be operated using a mobile app.

2015-09-23

Google's Self-driving Car Push Spurs Hiring Spree

Premium car makers are snapping up software experts as Google threaten to beat them in the race to a self-driving car.

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-16

Should the US Use Hidden Data to Warn Industry of Attacks?

What is government’s role in leveraging the “Dark Web” to alert private-sector organizations they’re the target for attack?

2015-09-21

Cybersecurity Is A Competition Issue For Business

Companies need to start thinking about how to measure and prepare for the real, business impacts of cyber threats.

2015-08-14

Hacking Critical Infrastructure: How-To Guide

Cyber-aided physical attacks on critical infrastructure is a growing concern. How to pull them off and how to defend against them.

2015-08-14

The Robots Taking Your Job Could Get You Killed

Poorly implemented automation in chemical & pharmaceutical plants is highly vulnerable to a catastrophic cyber attack.

2015-08-14

Darwinian Robotic Evolution

Artificial evolution of physical systems to create self-learning, improving robots.

2015-08-11

Will Robots Eliminate Many Humans From the Workplace?

The fear of millions of jobs being automated out of existence by robots is real. Here's how it will change the world -- for the better.

2015-07-15

The Third Industrial Revolution

A third industrial revolution is under way & like all revolutions, this one will be disruptive.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

TCS Forensics

TCS Forensics

TCS Forensics is Canada’s premier digital forensic, cyber investigation, and security firm.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

CXO Security

CXO Security

CXO Security is one of the leading cyber security companies in Australia. Our credentials extend to our ISO 27001 Certification, PCI QSA and CREST Australia for Penetration Testing.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Cyber Security Consulting Services to help you secure your mission-critical systems.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.