Category Archives: Security

Industrial Computers Lead the Way to Industrial Automation

Automation has been part of the production process for many years. In 1947 General Motors created an automation department in their factory. At that time, the technology tools used in industrial automation were largely electrical, mechanical, and hydraulic. Amazingly, in the first 17 years of the department, General Motors doubled their productivity and output. Proving that Industrial Automation is a valuable investment.
In 2012, Bill Gates was quoted as saying, “If GM had kept up with technology like the computer industry has, we would all be driving $25 cars that got 1,000 MPG.” The computer industry has gone through extensive automation. Components continue to get more powerful and smaller. With advanced computing capabilities computers not only lead the market in automation but are now being used to increase productivity and automation in other industries.

Industrial Automation

10 Ways to Stay Safe in the Cloud

Though cloud security has advanced, applications in the public cloud are not as secure as applications stored on servers in enterprises. Even with security issues, cloud computing is becoming a necessity in businesses. Cloud computing is recommended for disaster recovery, for increased mobility and for increased accessibility of applications and data. When risks are reduced, cloud computing becomes a viable solution for many people.

Currently, The Cloud Security Alliance is promoting standards to improve cloud security and help the public feel more secure about hosting applications in the cloud. Future standards will make it easier to evaluate all business’s security based on a pre-selected basis. Currently, each business must be evaluated on a case-by-case basis. This process is time-consuming and difficult. Until standards are more universal, here are some tips for staying safe in the cloud.

What is the Cloud?

Windows 8 Will Be Able To Manage Multiple Passwords

Microsoft has declared that the next Operating System that it is going to release shortly will feature an app that will be able to manage several passwords single handedly. According to a post on Microsoft’s Building Windows 8 blog the aforementioned Operating System will enable the users to maintain multiple passwords behind one single major password. The company has also mentioned that users will be able to synchronize their passwords in any other system that runs Windows 8.

Former US General talks about cyber weapons

Former No. 2 uniformed officer in the U.S. military claims that the United States should be developing offensive cyber weapons so that they could use it whenever some foreigners hack their computer.

Four-star Marine Corps general who retired in August as the vice chairman of the Joint Chiefs of Staff, James Wright says that the US must be open to developing cyber weapons since they got the capabilities. The US must also train people in order to make them credible of fighting this online threat so that the world will know that hacking is criminally liable, and the US will do something about it.

Cartwright, raised the profile of cyber security problem at a time when he was still in uniform, told Reuters in an interview that the rising intensity and occurrence of network attacks by hackers highlighted the need for an effective restriction.

Current and former U.S. officials did not want to talk about any weapons. However, it is widely accepted that the United has both offensive and defensive ways to respond to escalating and increasingly detrimental attacks from overseas.

To underscore the threat, this week an arm of the U.S. intelligence community announced a report that identifies China and Russia as the most active and determined nations, which uses cyber espionage in stealing U.S. trade and technology secrets.

Cartwright said that there is a need to send a strong signal to potential adversaries that the United States viewed that respond to cyber attacks as its “right to self-defense,” even if hackers were using a server in a third country.

He said that they’ve got to get do it, since all is a free shot at them and there’s no penalty for it.

His comments come as the Obama administration discusses the rules of engagement for cyberspace, now seen as a fifth domain for military operations that join air, land, sea and space.

At an earlier time, this year, the White House issued a new cyber strategy that once warranted, the United States would take action to hostile acts in cyberspace as it would to any other threat to their country.

Now the military must work out exactly a way to implement that. Key questions include how forthright Washington is going to be about work on offensive computer network attack weapons; what would signify an act of war; and ready plans for training, testing and using of its electronic arsenal.

Recent attacks on U.S. corporations include Google Inc, the Nasdaq stock exchange, Lockheed Martin Corp, and RSA, the security division of EMC Corp, have given government officials and lawmakers a new sense of urgency regarding how are they going to address threats to U.S. computer networks.