summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
Cybersecurity mesh, or cybersecurity mesh architecture, enables any person or thing to securely access and securely use any digital asset, no matter where it is located and to better defend the organization against security threats and sophisticated attackers. Digital assets (and individuals like remote employees and vendors) are increasingly located outside of the office, which is forcing organizations to rethink their approach to security controls. Learn More
Agribusiness is increasingly incorporating internet-enabled technologies and data-driven solutions into farm production, food processing, supplier industries, logistics, client communications and sales marketing. Farming operations that have adopted precision farming are even more dependent on advanced technology to carry out their day-to-day business. Read more
The European Union (EU), though, is moving relatively quickly towards new, common cybersecurity regulations for the bloc. The Network and Information Systems Directive (NIS2) was proposed by the European Commission in December 2020. This month, the proposed rules gained provisional approval from the EU Parliament and EU member states (through the Council of Ministers). Learn More
To meet the modern demand, organizations including the author's have adopted a defense-in-depth security program. Defense-in-depth security is about combining technology components with best practice security management to create protective layers reducing the risk of attack and intrusion. These efforts can be distilled into the following four components. Learn More
Cybersecurity is becoming an increasingly more important field than ever before, and jobs in this industry will only become more sought after as the years roll by. Read More
Nokia announced the launch of its Advanced Security Testing and Research (ASTaR) lab, located in Dallas, Texas. It is the first end-to-end 5G testing lab in the U.S. focused solely on cybersecurity. ASTaR’s holistic approach to researching and testing secure solutions and potential network threat mitigations will go beyond looking at individual network elements and also focus on the larger context of network use and abuse scenarios. Read More
Comments will be approved before showing up.