Search results for: software

Swisslog Healthcare's Translogic pneumatic tube system

Critical vulnerabilities may allow attackers to compromise hospitals’ pneumatic tube system

Armis researchers have unearthed critical vulnerabilities in Swisslog Healthcare’s Translogic pneumatic tube system, which plays a crucial role in patient care in more than 3,000 hospitals worldwide (including 80% of hospitals in North America). Attackers exploiting the vulnerabilities could gain complete control over the PTS network, negatively affect the functioning of the system and, consequently, damage sensitive materials, compromise sensitive information, and interfere with the hospitals’ workflows. Swisslog PTS vulnerabilities The Swisslog PTS system automates … More

Action1 releases its Q2 2021 results

Action1 Corporation, provider of a cloud-based remote monitoring and management (RMM) solution, announced its Q2 2021 results. The company’s revenue increased by a record 1,815% YoY worldwide, mainly due to expansion across Europe and North America. Action1 achieved a number of significant milestones during the quarter, including a major update of its RMM platform and being listed in both the “30 Fastest Growing Tech Companies 2021” by the Silicon Review and “30 Admired Companies to … More

chess

Gamification can redefine the cybersecurity demo experience

Lead generation is the easy part of the sales cycle. Marketing activities, sales enablement tools, events, and so on should create the perfect environment that allows sales teams to fill their sales funnel (if they are doing their job effectively). But while it may be possible to generate 200+ qualified enterprise leads in any given quarter, it is frequently the “last mile” in selling that can feel like an uphill journey. Converting qualified leads that … More

application

A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed technologies like cloud and containers to support the shift to IoT and address the remote workforce. While this digital shift is widely talked about, one of the often-overlooked repercussions of such rapid transformation is the need for a new approach to asset visibility. Traditional asset management responsibilities, such as inventory, software support, … More

CWE Top 25

A look at the 2021 CWE Top 25 most dangerous software weaknesses

The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two calendar years. These weaknesses are risky because they are many times easy to find, exploit, and can allow adversaries to take over a system, steal data, or prevent an application from working. The 2021 CWE Top 25 can help developers, testers, and users — as well as project managers, … More

remote workforce protection

Organizations still rely on weak security for remote workers

A new survey of enterprise IT security leaders showed almost 80 percent believe remote workers are at more risk for phishing attacks now because they’re isolated from their organizations’ security teams. Despite the significant threat increase, more than 59 percent of respondents felt solutions such as video training (27%), email reminders (20%), and VPNs (12%), were sufficient solutions by themselves to keep organizations safe from what those surveyed said were the biggest security breach fears: … More

AppOmni’s platform protects companies against cloud and SaaS breaches

From ransomware to data breaches, global cybersecurity incidents against organizations, governments, and individuals are on the rise. There have been a multitude of attacks over the past year, from SolarWinds and Kaseya to the Microsoft Exchange attack and the breach of Canadian plane manufacturer Bombardier. As the sophistication, complexity, and frequency of cybersecurity attacks continue to grow, organizations must decrease their security risk to ensure that they are protected on all fronts. “It’s not enough … More

icosahedral

Confidence that quantum computers will solve major problems has soared

Confidence that quantum computers will solve major problems that are beyond the reach of traditional computers—a milestone known as quantum advantage—has grown fast in the past twelve months, according to a new report by Boston Consulting Group (BCG). Investors are moving aggressively to increase the amount they allocate to quantum computing, with two-thirds of all equity investments in the field coming since 2018. Through 2017, those investments totaled ~$600 million, and that amount nearly doubled … More

SysTools Cloud Migration Service simplifies cloud data migration

Moving from one cloud to another cloud is too much hassle, main pain points in cloud migration are implementation, downtime, teams struggle and fear of data loss. To ease the process and mitigate the risk of data loss, SysTools has introduced SysTools Cloud Migration Service and it gives smooth and frictionless data migration experience to SysTools customers. Companies know that transferring many, complex applications require expert planning and technological solutions, and they recognize that cloud … More

Fortanix DSM SaaS provides FIPS certified HSM services to cloud platforms and applications

Fortanix announced the availability of its comprehensive Data Security Manager (DSM) solution as a cloud-delivered service. DSM SaaS provides the complete proven capabilities of the Fortanix on-premises solution and is the multicloud data security solution certified to the rigorous FIPS 140-2 Level 3 standard. Available immediately on demand, DSM SaaS is a path for organizations to achieve the highest levels of data security for public cloud, SaaS, hybrid cloud, and on-premises applications. Many organizations struggle … More

Microchip launches network synchronization solution for 5G wireless access devices

5G technology requires time sources to be synchronized throughout a packet-switched network ten times more accurately than 4G requirements. Microchip Technology now makes it possible to achieve 5G performance with the single-chip, highly integrated, low-power, multi-channel integrated circuit (IC) coupled with the company’s widely adopted and reliable IEEE 1588 Precision Time Protocol (PTP) and clock recovery algorithm software modules. “Our newest ZL3073x/63x/64x network synchronization platform implements sophisticated measure, calibrate and tune capabilities, thereby significantly reducing … More

Paian IT Solutions and Corent Technology offer its cloud optimization service on Azure Marketplace

Paian IT Solutions and Corent Technology create a transactable presence for cloud optimization services on Microsoft’s Azure Marketplace. Microsoft Azure customers across the DACH region (Germany, Austria, and Switzerland) can now subscribe to “PASOS,” giving them continuous optimization and modernization of their cloud assets. Paian IT Solutions is a provider of cloud services to the DACH region. Paian’s vision is to reach the entire Azure customer base across the region, offering PASOS – Paian’s Azure … More