article thumbnail

Enhancing IT Support for Manufacturing Systems: Addressing Critical Gaps

SecureWorld News

Manufacturing systems, especially the ones that work with SCADA technology (Supervisory Control and Data Acquisition), IoT devices, and other critical technologies, depend heavily on efficient IT support to ensure that the downtime is minimal, and the performance is optimal.

article thumbnail

Texas scrutinizes four more car manufacturers on privacy issues

Malwarebytes

The Notice delivered to Hyundai discusses covered data, which is defined as any information or data about a vehicle manufactured, sold, or leased by you, regardless of whether deidentified or anonymized. And in August, Paxton sued General Motors for selling customer driving data to third parties.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

App cyberattacks jump 137%, with healthcare, manufacturing hit hard, Akamai says

CSO Magazine

An analysis of customer data collected by content delivery network and internet services giant Akamai found that attacks targeting web applications rose by 137% over the course of last year, as the healthcare and manufacturing sectors in particular were targeted with an array of API and application-based intrusions.

article thumbnail

Texas Sues GM for Collecting Driving Data without Consent

Schneier on Security

Texas is suing General Motors for collecting driver data without consent and then selling it to insurance companies: From CNN : In car models from 2015 and later, the Detroit-based car manufacturer allegedly used technology to “collect, record, analyze, and transmit highly detailed driving data about each time a driver used their vehicle,” (..)

Insurance 327
article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.

article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Where possible, favor openness and transparency over aggressive data collection or restrictions which erode civil liberties. Privacy Rights – Pervasive monitoring and data collection erode privacy rights and dignity. Security theater manufactures consent. Focus only on proportional responses.

article thumbnail

China passes new automobile data security law

CyberSecurity Insiders

According to a media update released by the Cyberspace Administration of China (CAC) the new law called the Personal Information Protection Law(PIPL) will come into force from October 26th,2021 and will aim to standardize solutions pertaining to data security risks in automobile sector.