Metanav

Tag Archives | security

cloud-computing-types

Growing Cloud Computing Utilization in 2019

Although the use of cloud computing has increased fivefold since 2014, only 20% of workloads are run in the public cloud. Because housing workloads in a cloud network provides location-independent access, it’s expected that more companies will migrate to the cloud. Nominet, a cyber security company, reports that 88% of surveyed organizations were either currently […]

Continue Reading 0
biometrics-security-system-breach

A Breach in Biometric Security

Security company Suprema recently discovered that its biometric security system is unencrypted and open to the public. This means millions of users’ personal information are easy targets for cyber attacks. Security researchers working with a virtual private networks service company, vpnmentor, analyzed Suprema’s system. They were shocked at the amount of open data that they […]

Continue Reading 0
secure-smart-grid-distributed-energy-resources

Securing the Smart Grid

Today’s modern smart grid connects a variety of distributed energy resource assets to the power grid. This creates a diverse and disparate system, which both individuals and power companies can impact, with enormous benefits. Distributed energy collection assets (such as solar panels) are essential to increase the use of green energy, which helps the environment […]

Continue Reading 0
blockchain-in-supply-chain

How Blockchain is Transforming the Supply Chain

As anyone responsible for supply chain management can tell you, the demand for accountability and tracking at every step of the supply chain just continues to grow. For example, consumers want to know where their vegetables were sourced, how they were grown, handling methods, refrigeration temperatures in transit, how long since they have been harvested, […]

Continue Reading 1
edge-computing-use-cases-iot

Real-Life Use Cases for Edge Computing

Depending on how many of the 30 billion Internet of Things (IoT) devices forecast for global deployment by 2020 rely on the cloud, managing the deluge of IoT-generated data makes proper processing seem near impossible. Traditional cloud computing has serious disadvantages, including data security threats, performance issues, and growing operational costs. Because most data saved […]

Continue Reading 0
Blockchain bounce IEEE Innovation at Work

What Is Blockchain Bounce?

There is a veritably deafening buzz around blockchain at the moment as it’s the technology du jour. And rightfully so, as it ticks a lot of boxes: it’s decentralized, anonymous, and immutable. It also promises security through truth and transparency. Amid the excitement about it, brands are rushing to embrace the ledger technology. Upon announcing that […]

Continue Reading 0
Blockchain IoT security

Is Blockchain the Solution to IoT Security?

Security of Internet of Things (IoT) devices is an ongoing problem. The largely unregulated IoT market leaves plenty of room for device hacking. When considering applications such as smart homes and smart cars, this lack of security can be a real concern. A hacker, for example, could take over a self-driving car with someone in […]

Continue Reading 7