Default Category
-
Consejos para prevenir, detectar y responder a los ciberataques
Padilla, ElmarArticle ART-3014Information TechnologiesBasándose en las últimas investigaciones del Instituto Fraunhofer, el autor explica cuándo y cómo el firmware industrial puede sufrir un ataque y qué pueden hacer las empresas para defenderse. ¿Son conscientes las empresas de lo mucho que se juegan? ¿Qué está haciendo la alta dirección para protegerse y evitar un ciberataque de consecuencias devastadoras? ¿Está preparada para afrontarlo si se produce? Los directivos ilusionados con las pos...Starting at €8.20
-
Tips to Prevent, Detect & Respond to Cyberattacks
Padilla, ElmarArticle ART-3014-EInformation TechnologiesThis article describes the various ways that industrial firmware can be compromised. The author recommends how companies can defend themselves against cyberattacks, based on the latest research conducted by the research institute Fraunhofer (FKIE). How aware is your organization of the issues at stake? What is your senior management team doing to address firmware security and prevent a devastating cyberattack? How prepared are you if -- and when ...Starting at €8.20
-
How Brands Are Experimenting with Web3
Andjelic, AnaArticle HBS-H070U6-EInformation TechnologiesWeb3 is set up as a "winners-share-all" model, where products, services, markets, and exchanges are built together, governed together, and benefit together. Brands are increasingly dipping their toes into this world to learn how to connect with customers and create value via non-fungible tokens (NFTs), distributed ownership platforms, and blockchain. This article presents three approaches for doing so - virtual products, hybrid products, and dist...Starting at €8.20