In this article, you will find excerpts from reports recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Read more
April 29, 2024
summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid falling victim? Read more
Everybody is talking about generative AI. You were likely living at the bottom of the deepest cave for the best part of the last 18 months if you haven't seen anything about it. In fact, it's hard to find any business content online that does not refer to it. Rightly or wrongly, the topic is inviting itself into all sorts of conversations. Read more
You probably know better than to click on links that download unknown files onto your computer. It turns out that uploading files can get you into trouble, too.
Today’s web browsers are much more powerful than earlier generations of browsers. They’re able to manipulate data within both the browser and the computer’s local file system. Users can send and receive email, listen to music or watch a movie within a browser with the click of a button. Read more
Intel and AMD will issue security alerts today based on the findings. Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Read more
Protecting critical infrastructure from a cyberattack has never been more important.
What do solar and wind farms, chemical plants and even bank ATMs have in common?
They’re all examples of critical infrastructure run by operational technology (OT), which consists of hardware and software used to operate physical assets, such as industrial equipment in a plant or building management system. OT environments need to take measures to improve their cybersecurity posture, as cyberattacks targeting industrial sites are getting more advanced and more frequent, as Honeywell’s USB Threat Report has shown over the years.
In its sixth year, the USB Threat Report by Honeywell’s Global Analysis, Research and Defense Group examines USB-derived cyber threats. This report focuses specifically on malware found on USB storage devices used to carry files into, out of and in-between industrial facilities, as analyzed by Honeywell’s Secure Media Exchange (SMX) product.
Here are five takeaways to know from the 2024 USB Threat Report. Read more
Higher education institutions have increased their cybersecurity budgets as more universities fall prey to cyber attacks, Moody’s Investor Service says in a report.
The bond ratings agency reports that higher education institutions allocating a portion of their budget to cybersecurity increased more than 70 percent from 2019 to 2023. Read more
In this article, you will find excerpts from reports recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Read more
Comments will be approved before showing up.
July 31, 2024
June 30, 2024