HOW TO SECURE THE SMART CITIES OF THE FUTURE

February 16, 2019

Creating smart cities is one of GOI’s prime initiatives to make technology accessible to its citizens, with a proposal to cover 100 cities between FY 2015-16 to FY 2019-20. Smart cities use technology to deliver a higher quality of living for their citizens, with its environment, infrastructure, and even governance adapting efficiently to their needs. It means less waste and more personalisation in every interaction of a connected and informed society. These real benefits accompany real risks which must be mitigated.

Spotlight

Castleforce IT Consultancy Ltd

Castleforce help companies with IT Security compliance and risk management by offering products and services to help enforce policies. ISO27001, PCI DSS, Information Governance Toolkit are just some of the compliance areas we focus on.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More

Spotlight

Castleforce IT Consultancy Ltd

Castleforce help companies with IT Security compliance and risk management by offering products and services to help enforce policies. ISO27001, PCI DSS, Information Governance Toolkit are just some of the compliance areas we focus on.

Events