AI Business Insights | Arm Restructures Product Naming System to Highlight Energy Efficiency of AI Computing Power, Targeting Emerging Markets like Automotive

AI Business Insights | Arm Restructures Product Naming System to Highlight Energy Efficiency of AI Computing Power, Targeting Emerging Markets like Automotive

AI + Business AI Business Insights Arm Restructures Product Naming System to Highlight Energy Efficiency of AI Computing Power, Targeting Emerging Markets like Automotive The British chip design company Arm recently announced a renaming of its system-on-chip (SoC) product line, emphasizing its low power consumption advantages in AI workloads, showcasing its strategic transformation from a … Read more

Research Team on IoT and Cybersecurity

Research Team on IoT and Cybersecurity

Intelligent IoT Research Team 1. Team Introduction The “Intelligent IoT” research team led by Professor Li Guangshun consists of 8 members, including 2 professors, 3 associate professors, and 3 lecturers, with a well-structured academic background. The team focuses on research directions such as the Internet of Things, cybersecurity, edge computing, blockchain, artificial intelligence, and big … Read more

Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

As cyber attack methods continue to evolve, industrial control systems, represented by power systems, are gradually shifting from being a “secondary impact area” to a core target in the cyber attack chain. Especially in the context of the ongoing advancement of the industrial internet and the continuous integration of “cloud-edge-end” collaborative systems into key business … Read more

Remember: Defense in Depth

Remember: Defense in Depth

Abstract: Implementing a defense-in-depth cybersecurity strategy against internal and external threats is an effective measure to ensure the security of Industrial Control Systems (ICS). By building a defense-in-depth cybersecurity plan and implementing the 8 recommendations proposed in this article, it will help reduce the cybersecurity risks of Industrial Control Systems (ICS). In the era of … Read more

The Autonomous SOC: A Journey, Not a Destination

The Autonomous SOC: A Journey, Not a Destination

SentinelOne often discusses the concept of the autonomous SOC with their clients and the fundamental transformation it brings to daily security operations. Today, we take a third-party perspective to see how they define this concept. Additionally, in this article, SentinelOne presents a maturity model for the autonomous SOC. Like much in cybersecurity, what matters is … Read more

Hybrid Cloud and Edge Computing: Empowering Energy Management with Digital Technologies

The energy industry is undergoing a significant transformation driven by advancements in digital technology and the demand for real-time data analysis. As energy companies pursue modern operational methods, they require innovative solutions to address the unique challenges they face. Currently, energy practitioners are most concerned about: • Increased downtime risks and rising associated costs; • … Read more

NIST Releases Cybersecurity Guidelines for IoT Device Manufacturers

NIST Releases Cybersecurity Guidelines for IoT Device Manufacturers

The National Institute of Standards and Technology (NIST) has developed cybersecurity guidelines for IoT device manufacturers, providing directions and guidance for the secure manufacturing of IoT products. As part of the IoT cybersecurity program, NIST recently released two documents aimed at providing cybersecurity guidelines and best practices for IoT device manufacturers. These guidelines are part … Read more

HTTP Flood Attacks: How the ‘Single Madman’ Uses ‘Legitimate Requests’ to Breach Your Server?

HTTP Flood Attacks: How the 'Single Madman' Uses 'Legitimate Requests' to Breach Your Server?

Today, let’s discuss something more insidious—did you think DDoS attacks are all about overwhelming traffic? Wrong! There is a type of attack that disguises itself as a normal user, using legitimate requests to drain your server, known as the pinnacle of “legitimate scamming”! It is the HTTP Flood, colloquially referred to as the “Single Madman”—it … Read more

Five Major Myths About IoT Security

Five Major Myths About IoT Security

The value generated by data far exceeds the value of global goods trade —— McKinsey, “Digital Globalization” (2016) There are billions of connected IoT devices globally. These devices span multiple industries, whether they are security cameras, health monitoring devices, or simple office printers, they possess transformative power. However, with the explosive growth of connected technology, … Read more

Wormable AirPlay Vulnerabilities: Zero-Click Remote Control of Apple Devices in Public Wi-Fi Environments

Wormable AirPlay Vulnerabilities: Zero-Click Remote Control of Apple Devices in Public Wi-Fi Environments

Cybersecurity researchers have recently disclosed a series of security vulnerabilities in Apple’s AirPlay protocol, which have now been patched. Attackers could successfully exploit these vulnerabilities to control devices that support this proprietary wireless technology. The Israeli cybersecurity company Oligo has collectively referred to these vulnerabilities as AirBorne. Vulnerability Combination Enables Worm-like Attacks Researchers Uri Katz, … Read more