The new IoTAC security model for IoT architectures will be deployed and validated in four different pilots, representing diverse industry domains. In the case of the Airborne (drone), the pilot will focus on the vulnerability of Unmanned Air Systems (UAVs) and the vulnerability of fixed sensors that are in remote…
Insights
Prosumers are households that are both producers and consumers of electricity. A prosumer has a grid-connected decentralized production unit and makes two types of exchanges with the grid: energy imports when the local production is insufficient to match the local consumption and energy exports when local production exceeds its needs. Prosumers are growing in the…

László Vajta, Budapest University of Technology and EconomicsOctober 15, 2021
The new IoTAC security model for IoT architectures will be deployed and validated in four different pilots, representing diverse industry domains. In the case of the connected car, the pilot will provide a cooperative, connected and automated (CCAM) scenario, where V2X (Vehicle to Everything) data exchange enables cooperative manoeuvres integrating…

Leonardo Gonzalez, Tecnalia Research and InnovationSeptember 23, 2021
While the Zero Trust Model of Cybersecurity was created by John Kindervag back in 2009, it has become a buzzword in recent years, and more of a priority due to COVID-19 and the remote work economy, as it offers an optimal way to address current security challenges for a cloud-first,…

Anna Marton, Safepay SystemsSeptember 9, 2021
The operate and monitor phases are the final phases of the SDLC. They are collectively referred to as the maintenance phase and they are commonly thought of as a rather passive part of the process, but nothing could be further from the truth. This is where all the action is.…

Eric Estes and David Kovacs, ATOSAugust 5, 2021
Recent Comments