Latest In: Cybersecurity

AI artificial intelligence Cybersecurity IIoT Industrial Internet of Things machine learning Manufacturing ML ransomware RFID readers

The Looming Cybersecurity Threat at the Industrial IoT Edge

The Industrial Internet of Things (IIoT) has transformed how industries operate, delivering efficiencies and insights previously unimaginable. Businesses…

Expert Views June 4
accountability AI frameworks artificial intelligence biases Cybersecurity Data Privacy GenAI Generative Artificial Intelligence
Biden Artificial Intelligence AI

Federal Report Highlights Risks of AI

A recent review by the U.S. Government Accountability Office (GAO) found while many are experiencing the benefits of…

News May 20
5G Cybersecurity Disrupt.com DownStream Technologies Mike Ellow printed circuit board Qualcomm Semtech Siemens Siemens Digital Industries Software Umair Gadit Web3.0

Siemens, Disrupt.com, Semtech: RFID Roundup

Siemens Acquisition Expand PCB Design-to-Manufacturing Flow Siemens Digital Industries Software completed the acquisition of DownStream Technologies, a leading provider…

News April 10
CMMC contractors Cybersecurity Cybersecurity Maturity Model Certification DoD National Institute of Standards and Technology RFID U.S. Defense Department

How RFID Enhances CMMC Compliance

Security regulations are an increasingly prevalent consideration for modern businesses. One of the most stringent is the U.S.…

Expert Views February 11
AI artificial intelligence blood pressure monitors Centennial Pharmacy Services Cybersecurity glucose monitors healthcare IoT Lindsay Dymowski Linxens personalized care plans predictive analytics smart phone University of Bologna wearables

Artificial Intelligence as Medicine

The analytics of AI and connectivity of IoT create an opportunity and challenge for the next generation of…

News February 5
artificial intelligence Cybersecurity

AI and Cybersecurity: How AI is Both a Tool and a Challenge in Cybersecurity Efforts

The cybersecurity landscape is undergoing a seismic shift with the advent of artificial intelligence. AI is not only…

Expert Views January 21
Cloning Cybersecurity Data Data Interception Denial of Service Attacks DoS Attacks Eavesdropping Replay Attacks RFID RFID tags Spoofing Attacks Supply Chain supply chains

5 Cybersecurity Guidelines for RFID-Enabled Supply Chains

RFID technology is essential to supply chain workflows. By enabling real-time visibility and seamless data exchange, companies operate…

Expert Views October 30
AI Anomaly detection tools artificial intelligence cybercrimes Cybersecurity Internet of Things IoT passwords
IoT Anomaly

Why Anomaly Detection Is Essential for IoT Security

Internet of Things (IoT) devices have become extremely popular in homes and workplaces. However, their abundant and rising…

Expert Views October 2
Cybersecurity Google Authenticator ID badge MFA multi-factor authentication Near-field Communications phishing attacks single sign-on smartphone

Is Your Organization Ready for Phishing-Resistant MFA?

MFA’s do not meet emerging cybersecurity standards and industry best practices RFID and NFC products can be a…

Expert Views July 5