The current industrial modernization requires a deployment of communication networks that allow the operation and monitorization of diverse processes, such as water distribution or electricity generation. This cluster of neworks belongs to what is commonly known as Operation Technology (OT), which is sensible to suffer from different kinds of cyberattacks that may cause security breaches, […]
During the following minute thousands of applications will request millions of people to reveal their location. However, these data are extremely sensitive, so their processing needs to be done to avoid compromise the privacy of the users.
The adoption of new technologies is forcing companies to innovate in cybersecurity to cope with the development of new threats. When fraud and identity theft are presented as the great enemies of the digital age, technology is their best ally.
This month at GRD Tech we talk to you about Industry 4.0, the industrial revolution of the entire value chain. Where do we stand? What challenges will companies have to face?
It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our own software solving effectively frequently used tasks so that we do not need to reinvent the wheel.
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
Last week San Francisco’s Moscone Center hosted the world’s largest professional meeting on ICT security. More than 45,000 expert and visitors attended the RSA Conference 2018 to learn about new policies, practices, advances and technological solutions that are being developed to deal with current challenges facing the sector and to anticipate future ones. As it […]