summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
China has passed legislation setting out tougher rules for how companies handle user data, a move pushing forward its campaign to curb big tech’s influence.
The legislature of the Asian nation approved the Personal Information Protection Law. Learn More
The Defense Department’s Cybersecurity Maturity Model Certification program, CMMC, has barely gotten off the ground. But it must be here to stay because some groups are already looking to reform it. Case in point: the congressionally chartered IT Acquisition Advisory Council has partnered with the CMMC accreditation body to establish a Center of Excellence. Federal Drive with Tom Temin got more from attorney and CMMC expert Robert Metzger. Read more
Because cybersecurity risks are global, it makes sense to address these threats using a coordinated, collaborative approach. We need to ensure that risks to cybersecurity, data protection, privacy, and online safety are addressed. Learn More
The necessity to scale up production and supply of products to health organizations and the need to continually develop new and cutting-edge healthcare devices has forced many healthcare manufacturers to embrace digitization across all stages of the product life cycle at an accelerated pace. Adopting new technology and new ways of working to meet demand and bring products to market as quickly as possible has also caused organizations to overlook cybersecurity, potentially leaving them vulnerable. Learn More
With projects like Blue Origin and SpaceX, private-sector innovators like Jeff Bezos and Elon Musk are pursuing outer space endeavors at seemingly breakneck speed. These projects give us a glimpse of what's possible, making outer space travel and industry seem reachable within our lifetimes.
But with the digital technology and software required to make that happen, it's time to start assessing things from a cybersecurity perspective. In fact, both the private and public sectors are already beginning to tackle what cybersecurity means in the context of outer space. Satellites already transmit sometimes sensitive data to and from Earth, making them a potential target for hackers or malicious actors. Read More
A Senate bill intended to shore up the nation’s roads, pipes and electric grid includes billions to protect that aging infrastructure from cyberattacks.
With a series of high-profile ransomware attacks fresh in their minds, U.S. Senate negotiators wove cybersecurity investments throughout the bipartisan $1 trillion infrastructure proposal, which passed the Senate in a 69-to-30 vote on Tuesday and now moves to the House for a vote. The allocations are a reflection of the growing realization in Congress that a computer attack could leave Americans without water, power or other essentials. Read More
T-Mobile US Inc (TMUS.O) said on Friday an ongoing investigation into a data breach revealed that hackers accessed personal information of an additional 5.3 million customers, bringing the total number of people affected to more than 53 million.
The third largest U.S. wireless carrier had earlier this week said that personal data of more than 40 million former and prospective customers was stolen along with data from 7.8 million existing T-Mobile wireless customers.Read More
CEOs and board members must draw from their decades of expertise in integrating energy assets with operational technology (OT) and leveraging information technology (IT) networks to reduce cyber risk across their hyperconnected operating environments. For decades, oil and gas companies have pursued productivity gains by linking physical energy assets with OT control systems and IT networks. That trend continues today with energy organizations seeking big data, artificial intelligence (AI), and automation solutions to reduce costs, improve efficiency and help reduce emissions. Throughout this process, industry executives have also pioneered key management principles and risk-based approaches to securing the technologies and processes that serve as the foundation for their hyperconnected industrial Internet of Things (IoT) business model. Read More
Comments will be approved before showing up.