DE · Topics · Cybersecurity


Sponsored Content
Optimizing Security — Safeguard Your Printing Environment
Your large-format printing environment could be vulnerable to data breaches. Here's how you can address common security risks.
Designing Over-the-Air, Secure Devices
The fundamentals of IoT device security are hard to build in late in the development process, and the details do matter.
By the Numbers: The Internet of Things
Facts and figures on the Internet of Things (IoT).
Sponsored Content
Born this Way: Higher Security for High Speed Computing
IDC predicts that, by 2019, 70% of major multinational corporations with roots in the U.S. and Europe will face significant cybersecurity attacks
Sponsored Content
Develop a New HPC Cybersecurity Mindset
High-performance computing (HPC) has opened the door to many innovations; yet, it has also introduced new cybersecurity challenges, as the computational power has attracted cybercriminals, as well as malicious insiders.
Balance Cybersecurity & Collaboration
Open collaboration raises fears that the system security will be compromised, yet locking a system down hampers research and ultimately interferes with the reasons for providing computing resources.
Cybersecurity, HPC and Big Data
In the past two years, IDC’s HPC team (now called Hyperion Research) has conducted major studies on cybersecurity practices in the U.S. private sector, with special attention to the roles of HPC and big data analytics.
Sponsored Content
How IoT Is Making Security Imperative for All Embedded Software
Devices for the Internet of Things require secure embedded software. Here's what you can do to improve your code's security while reducing costs and cycle times.
Industrial Internet Consortium Releases Security Framework
The framework provides a systematic view at IIoT security.
IoT Security: Smart Measures for Smart Devices
Early integration and testing is key for safer products.
Security Frameworks to Set the IoT and IIoT in Motion
The IoT market already offers a number of solutions to prevent attacks.
Software Piracy: A Growing Epidemic
The practice exposes customers to a range of IT risks.
CeBIT Keynoter Focuses on Securing the ‘Things’ in IoT
Lessons learned from hacking the Tesla Model S are applied.
Nissan LEAF Security Flaws Exposed via Hacking
The NissanConnect EV app could be hacked via a Web interface to control individual car functions and access journey data.
Owl Computing Named Specialist ICS Security Tool Provider
The firm offers cybersecurity for industrial control systems and critical infrastructure.

Latest News

Formlabs Acquires Micronics
Purpose of acquisition is to advance accessible SLS 3D printing, Formlabs reports.

America Makes to Host 12th Annual MMX in Youngstown
The event is designed for professionals in government and military, academia, and the additive manufacturing (AM) industry to network, plan,...

Integrated Deposition Solutions Partners with Advanced Printed Electronic Solutions
Goal of collaboration to forge application development and manufacturing partnership leveraging NanoJet technologies to accelerate product concept-to-production of applications.

NAMI Picks 3D Systems’ Metal & Polymer AM Solutions
NAMI purchased 3D Systems’ metal DMP Factory 500 and DMP Flex 350 Dual solutions, and polymer SLS 380 solution to produce parts for...

Find CAD on any Website With New Tool
CAD SCOUT 3Dfindit enables engineers and designers to instantly find CAD for products they are researching online.

Altair HyperWorks 2024 Released
Enhancements help boost environment for AI-powered simulation-driven solution, company says.

All posts