Tag: Internet of Things
-
Episode 23: The Missing Link in Migration Work
Performing an Active Directory migration to the cloud can be quite an ordeal with so many elements that need to match up precisely. This …
-
Considerations for Operational Technology Cybersecurity
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, …
-
3 UK Cyber Security Trends to Watch in 2024
Staying up to date with the latest in cyber security has arguably never been more paramount than in 2024. Financial services provider …
-
Choosing the Right Microcontroller for Your Project
Choosing the Right Microcontroller Choosing the right microcontroller for your project can be tricky. There are so many types out there, …
-
Navigating Tomorrow: AI and Big Data as Catalysts for Smarter Governance
In a world increasingly shaped by big data and artificial intelligence (AI), it’s curious why these advancements haven’t significantly …
-
Telemetry data, the new oil: the importance of securing IoT
Miri Ofir is the Research and Development Director at Check Point Software. Antoinette Hodes is a Global Solutions Architect and an …
-
An educational robot security research
Security research into an AI robot for kids revealed several vulnerabilities enabling a cybercriminal to take over device control and to …
-
A.I. is Not All It’s Cracked Up to Be…At Least Not Yet!
Recently Samsung releases its new Galaxy S24 phone The big buzz is centered around how Galaxy users discover the world around them by …
-
Riding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber Threats
In nearly every segment of our lives, AI (artificial intelligence) now makes a significant impact: It can deliver better healthcare …
-
Debunking 10 common misconceptions about IoT devices
By Antoinette Hodes, a Check Point Global Solutions Architect and an Evangelist with the Check Point Office of the CTO. This article aims …
-
Getting off the Attack Surface Hamster Wheel: Identity Can Help
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how …
-
New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks
A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as …
●●●