Read more about the Xconomy Cybersecurity event.
Photo credit: © 2017 Patankar Photography & Design
“Car makers will have to provide more protection for internet-connected vehicles from cyber attacks, under new government guidance.”
“…The Autonomous and Electric Vehicles Bill, announced in the Queen’s speech this year, aims to create a framework to insure self-driving vehicles.
Measures to be put before Parliament mean that insuring new vehicles will provide protection for owners if technologies fail.”
Gigavation leadership featured at flagship Detroit Automotive Conference in June 2017.
Read more: http://www.tu-auto.com/detroit/
“Malware-laden USB sticks were accidentally sent by IBM to a series of enterprise customers that had purchased storage systems developed by the computing giant…
The incident underlines the inherent security challenges assumed by companies that deal with global supply chains, where individual components to construct a specific products are manufactured in different locations and by different companies based in foreign countries.”
Gigavation is now hiring three positions:
Software Engineer for VDI (C/C++/C#)
Software Engineer for Android (C/C++/Java)
Senior Quality Assurance Engineer
For more information, please see: Careers.
Gigavation will be featured at the 2017 MIT Startup Workshop – Cybersecurity: “About Cybersecurity and AI Get Real: Attacks, Players, Solutions” on February 16, 2017
Read more: https://ilp.mit.edu/conference.jsp
“The situation seems eerily similar to the Edward Snowden leak, and has drawn renewed attention to insider threats and the risks posed by authorized users granted access to sensitive information in corporate networks.
…While insider attacks and leaks of sensitive data from the NSA make for very salacious headlines, insider threats are in no way limited to the NSA or government agencies. Every company has some information and data of a sensitive nature that should not be shared or seen outside the company, and every company faces the risk that an employee with access to that data could expose it—either intentionally or inadvertently.”