20 Mar '17, 5pm

#CyberSecurity…

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, Advanced Technology Edition , issued in conjunction with analyst firm 451 Research. According to the report, 93% of respondents will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. A majority of those respondents (63%) also believe their organizations are deploying these technologies ahead of having appropriate data security solutions in place. Fears about cloud decreasing, SaaS usage increasing While concerns about data security in cloud environments remains high, they’ve dropped off since last year. In 2016, 70% of respondents voiced worries about security breaches from attacks targeting cloud service providers (CSPs); in 2017, 59% expressed fears. The sec...

Full article: https://www.thalesgroup.com/en/node/2714623

Tweets

via @ElectronicDesgn

via @ElectronicDesgn

electronicdesign.com 20 Mar '17, 6pm

When designing a medical IoT device, care must be taken to select the right silicon. With tight development cycles compres...

China bets big on Industrial IoT

China bets big on Industrial IoT

eetasia.com 20 Mar '17, 12am

China is pushing hard to develop the Industrial Internet of Things (IIoT) in the country. The Chinese government projects ...

Small data may be bigger than big data

straitstimes.com 18 Mar '17, 9pm

SMALL DATA: THE TINY CLUES THAT UNCOVER HUGE TRENDS By Martin Lindstrom John Murray Learning/ Paperback/245pages/ $26.66 w...

Data: The newest, most underused commodity

channelnewsasia.com 19 Mar '17, 9am

SINGAPORE: Nawal Roy is only too eager to rattle off strategies over a map of Singapore. Marked with icons and numbers, it...

Shut the Backdoor! More IoT Cybersecurity Problems

Shut the Backdoor! More IoT Cybersecurity Problems

hackaday.com 22 Mar '17, 2pm

We all know that what we mean by hacker around here and what the world at large thinks of as a hacker are often two differ...

Connectivity & #IoT Create Greater #SupplyChain #Data Collection Options

Connectivity & #IoT Create Greater #SupplyChain...

ebnonline.com 17 Mar '17, 6pm

The Internet will disappear. There will be so many IP addresses, so many devices, sensors, things that you are wearing, th...

Defining (artificial) intelligence at the edge for IoT systems

Defining (artificial) intelligence at the edge ...

embedded-computing.com 20 Mar '17, 11pm

As more IoT devices come online, machine intelligence will increasingly be classified as a system’s ability to ingest info...

Offshore Energies: Data Technology Transfer fro...

renewableenergyworld.com 20 Mar '17, 11am

Organizations are collecting more information than they ever have in the past, and energy companies are no exception. One ...

Using hacked data a crime under proposed change...

channelnewsasia.com 09 Mar '17, 4am

SINGAPORE: Under proposed changes to the Computer Misuse and Cybersecurity Act (CMCA), the act of obtaining hacking tools ...

[Mothership] The things they don’t tell you abo...

mothership.sg 16 Mar '17, 5am

For many young Singaporeans, working overseas is fashionable. The whole idea of experiencing new cultures and seeing the w...

Unprecedented Integration Driving 5G and IoT at Mobile World Congress 2017

Unprecedented Integration Driving 5G and IoT at...

microwavejournal.com 20 Mar '17, 8am

Verification of NB-IoT Device Compliance and Battery Life - Keysight introduced the NB-IoT test solution covering from des...