Tag: Cyber Security

adaptive cyber security

Predicting and Managing the Threats Through Adaptive Cyber Security

In an age where cyber security threats are an unfortunate everyday fact of life, cyber security systems are consistently being pushed to their limits by the new and evolving methods employed by hackers and others cyber threats. Organizations today are looking for solutions that enable them to predict, prepare and react proactively to the shifting […]

Ensuring IT/OT Network Security in Critical Infrastructure

Background After a series of high-profile cyber security incidents on critical infrastructures, governments and enterprises of such facilities have taken malwares seriously into considerations. Apparently, the malwares or ransomware over the past couple years, such as Stuxnet, WannaCry and Crash Override, have publically exposed the vulnerability of SCADA Networks or Industrial Control Systems in today’s […]

Need of proactive IT / OT Security Strategy in Healthcare

Operational Technology or OT security has taken the center stage in the discussion of protecting our critical infrastructures from cyber attacks. With the rise of smart-devices and the Internet of Things, every industry has become ever more connected and integrated. Network-based systems and tools have become ever more common among organizations due to their enhanced […]

Securing High-Tech Manufacturing From Cyber Attacks

In recent years, the number of industries that have evolved to the point that a large portion of their critical infrastructure are computer-based, networked systems has continued to increase rapidly, meaning more and more industrial systems are vulnerable to cyber attacks. Increased connectivity between systems brings the potential for a multitude of organizational, operational and […]

Delivering In-train Infotainment with Onboard Passenger Information System

  Background Passengers on-the-go always demand real-time schedule updates and infotainment, and this has driven the widespread deployments of in-train/in-bus PIS (Passenger Information System). The automated PIS delivers audio-visual information such as updated arrival and departure times, potential delays, alternative plans, local weather, news and some entertainment and advertising. Meanwhile, the system must be constantly […]

Securing Cash-In-Transit with Access Control, Remote Tracking and Video Monitoring

Background Cash-in-transit vans are frequently exposed to high risks of hijacking, heist and violent attacks. In fact, there have been numerous cases that the vehicle is hijacked and results in the casualty of security guards. Since vehicle security and personnel safety are the primary concerns, modern technologies have been adopted to ensure the safety and […]

Enabling In-vehicle Control and Real-time Surveillance for Theme Park Shuttle Services

  Background Shuttle services in theme parks have been greatly impacted by the advancements in communication technologies. When passengers are boarding the shuttle buses or trams to different park areas or hotels, they want broadcasted entertainment and multimedia to have the ultimate customer experience. For theme parks to stay competitive, their shuttle services must be […]

Mitigating Sophisticated Cyber Threats with Modularized Next-Generation Firewall

  Background Nowadays most enterprises and organizations have fortified themselves with some network protection measures, such as basic encryptions, anti-virus and web-filtering. However, as cyber attacks are constantly evolving and becoming more innovative than ever, these conventional protections are encountering their limits against the sophisticated cyber intrusions like social engineering, zero day attack and advanced […]

LEC-7230M: Enabling Successful Procurement Management for Sustainable Business Operation

  Introduction Successful procurement management encompasses identifying corporate needs, finding/qualifying goods/services suppliers, requesting proposals, negotiating terms/condition, contracting, delivery and analyzing results. At their most fundamental level such systematic approaches require the use of physical asset management software, robust SFF hardware appliances and services in order to add values, save time/money and streamline business practices that […]

Integrating Multi-Layer Architectures to Mitigate Cyber Vulnerabilities in Oil and Gas Sectors

  Background Nowadays, utility productions, such as oilfield, petroleum refinery, and offshore gas drilling, have become more and more digitalized and connected. Devices deployed such as PLCs, HMIs, SCADA, sensors and embedded computing systems are inter-connected operational technologies (OT) in order to optimize automation and productions. Though digitalization and interconnections of OT devices have increased […]