Smart Business

High noon in the cloud: Gaia-X and the Lawful Overseas Use of Data

High noon in the cloud: Gaia-X and the Lawful Overseas Use of Data

In certain circumstances under the Cloud (Clarifying Lawful Overseas Use of Data) Act, the US courts can demand the surrender of any personal data from American cloud providers.

Interview Thomas Pilz: Cyberattack victim- Fight like Rocky!

Interview Thomas Pilz: Cyberattack victim- Fight like Rocky!

CEO Thomas Pilz talked with Smart Industry about how it feels to be a cyberattack victim and what he thinks is the best way to defend against
cybercriminals.

IoT Security: Identity of things

IoT Security: Identity of things

Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.Io

Smart Utilities: Coming in from the Cold

Smart Utilities: Coming in from the Cold

Texas froze and the utilities stopped flowing. Gas supplies reduced by half and the electricity generators stopped turning. It seems polar conditions can happen anywhere, so how can smart utilities use IoT to ensure uninterrupted delivery to their customers?

Predictive Manufacturing: The Future of Making

Predictive Manufacturing: The Future of Making

Predictive maintenance, using IoT to anticipate and prevent breakdowns by collecting and analyzing machine data, has been gaining momentum in recent years.

eSIMs:  The Great IoT Connectivity Lockdown

eSIMs: The Great IoT Connectivity Lockdown

When you move house your devices go with you. It’s not so simple in the global communications world but eSIMs promise to break through the barriers that tie us down.

5G Campus Networks: Build your own

5G Campus Networks: Build your own

Operating a private campus network offers several advantages and will help improve production and enable factory automation. There are three options for building a 5G campus networks.

Standardization Versus Risk Management: How Much Cybersecurity Is Enough?

Standardization Versus Risk Management: How Much Cybersecurity Is Enough?

There’s no doubt that cybersecurity is a complex topic to legislate. Given how fast-moving security’s components are, legislation is often too slow and cumbersome. Antonio Ramos, CEO of Leet Security, a cybersecurity ratings agency based in Madrid and member of the Stakeholder Cybersecurity Certification Group (SCCG), says that recent trends […]

EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?

EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?

A principal factor that will shape the views of the Radio Equipment Directive (RED) delegated act relates to how significant groups or individuals view the scale of the cybersecurity problem in consumer devices.

The EU Cybersecurity Act: A Price worth Paying

The EU Cybersecurity Act: A Price worth Paying

A host of new rules should improve cybersecurity, but some industry groups warn these will add to costs and administrative burdens and may even spawn confusion and ambiguity.