P&G turns to AI to create digital manufacturing of the future

P&G turns to AI to create digital manufacturing of the future

Over the past 184 years, The Procter & Gamble Co. (P&G) has grown to become one of the world’s largest consumer goods manufacturers, with worldwide revenue of more than $76 billion in 2021 and more than 100,000 employees. Its brands are household names, including Charmin, Crest, Dawn, Febreze, Gillette, Olay, Pampers, and Tide. In summer 2022, P&G sealed a multiyear partnership with Microsoft to transform P&G’s digital manufacturing platform. The partners say they will create…

Read More

Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under New European Rules

Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under New European Rules

The European Commission has publicized new liability rules on digital products and artificial intelligence (AI) in order to protect consumers from harm, including in cases where cybersecurity vulnerabilities fail to be addressed. The two proposals the Commission adopted on September 28, 2022 will modernize the existing rules on the strict liability of manufacturers for defective products (from smart technology to pharmaceuticals). Additionally, the Commission proposes – for the first time, it says – a targeted harmonization…

Read More

Why construction sites need proactive security

Why construction sites need proactive security

Why construction sites need proactive security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Quantifying the risk of cybersecurity

Quantifying the risk of cybersecurity

Quantifying the risk of cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Re-Tooling Your Way to a More Efficient Enterprise

Re-Tooling Your Way to a More Efficient Enterprise

To create a more efficient and streamlined enterprise, businesses often find themselves tempted to bring in brand new systems that promise major improvements over the status quo. This can be a viable strategy in some cases – and it will impress stakeholders that prefer to shake things up. But it comes at a cost. Swapping out the old for the new will require heavy doses of training to get everyone up to speed, and that’s…

Read More

About a third of cloud users need to learn resiliency lessons from Ian

About a third of cloud users need to learn resiliency lessons from Ian

Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix while downtime costs in the six figures per hour. If Ian didn’t impact your operations, now is the time to prepare for a future disaster that might hit your network. Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps,…

Read More

About a third of you cloud users need to learn resiliency lessons from Ian

About a third of cloud users need to learn resiliency lessons from Ian

Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix at a downtime cost in the six figures per hour. If Ian didn’t get you, now is the time to prepare for a future disaster that might hit your network. Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps,…

Read More

Common Cloud-Native Security Misconfigurations & Solutions

Common Cloud-Native Security Misconfigurations & Solutions

Cloud configuration errors are a significant concern for stakeholders invested in modern DevOps processes, thanks to the quantity of cloud-native software used in production environments these days (think of microservices, as well as serverless and containerized workloads such as Kubernetes). Misconfigured cloud environments can result in everything from poor performance, to system downtime, to data breaches. Cloud-native architectures mean the introduction of new attack surfaces. Complex architectures with various network stack components can be involved…

Read More

Lack of inclusive culture is driving UK youth from tech jobs

Lack of inclusive culture is driving UK youth from tech jobs

Businesses must prioritise fostering an inclusive company culture in order to improve the professional experiences of young tech workers from underrepresented groups, according to Wiley Edge’s second annual ‘Diversity in Tech’ report. The report is based on a survey that asked UK respondents about their perceptions of the technology industry, to establish what is currently being done to actively improve diversity in tech teams, and where more work is still required. The report comprises responses…

Read More

New Chaos malware spreads over multiple architectures

New Chaos malware spreads over multiple architectures

Image: Sashkin/Adobe Stock The Chaos malware, as reported by the Black Lotus Lab from Lumen, is able to work on different architectures: ARM, Intel (i386), MIPS and PowerPC, providing DDoS services, cryptocurrency mining and backdoor capabilities while written for both Windows and Linux operating systems. The malware is fully written in the Go programming language, which enables developers to more easily port their software to various different operating systems. They only need to write the…

Read More
1 2,743 2,744 2,745 2,746 2,747 4,178