Manufacturing

Hacking by sound not that simple

Aug 17th, 2015 | By

A recent story from Reuters kicked up a bit of a stir by claiming that hackers could use sound to steal data from a computer or network. While the story was true it turns out that it isn’t the whole story and is less of a problem than the report inferred, according to cybersecurity expert Jack Wolosewicz. Here’s the interview.

 

 



Secure collaboration is a quiet trend at #52DAC

Jun 9th, 2015 | By

By Lou Covey
Editorial Director

While outsourcing software and design development is a common practice, the idea of putting your company’s crown jewels into the cloud for a freelancer to monkey with tends to drive sales of anti-emetics. Can you safely allow virtual strangers to access your server, or should you just suck it up and overwork your employees?

That has been a continuous conundrum of the Electronic Design Automation Industry (EDA) and its customers in the embedded software and semiconductor industries. Larger companies, like Synopsys and Intel either use internal security paradigms in the collaborative tools or work with …



Outsourcing has become a zero sum game with benefits for many

Jun 1st, 2015 | By

This is the latest in our ongoing series of articles on outsourcing, benefits and downfalls.

By Lou Covey
Editorial Director

Outsourcing product design and manufacturing has become an international way of life despite the concern that it takes jobs world_of_outsourcingaway from one country in favor of another. As the practice has matured, it has become more of a zero-sum game as long as the participant realize it is best as a cooperative exercise.

The decision to outsource any part of a product lifecycle is not longer a matter of which country a company will choose, but which countries to choose. …



Data breach fatigue and NIH fuel ineffective cyber security

Mar 19th, 2015 | By

This is another part of our ongoing series on outsourcing services, again focusing on security  Large companies rely on the work of outsourcing providers for developing security solutions and containing breaches.

By Lou CoveyNew Tech Press

News reports about data breaches are almost a daily occurrence. Companies spend millions on identity protection services for affected customers while the same type of breaches continue with no end in sight. The sheer volume of data stolen is astronomical begging the question, why isn’t anything being done?

“There is no financial reason for companies and governments to do anything about the …



Hackers target auto software. Are we ready?

Feb 9th, 2015 | By

In our last interview with Jack Wolosewicz, CTO of Eurocal we looked at the security holes in personal video applications.  In part two, we look at a greater risk: automotive software.