Drivers at Risk? Securing the Connected Car

The next revolution in the automotive sector is digital with the prospect of autonomous driving in the distant future. Two worlds converge. One of short product lifecycles and rapid innovation, and one of longer planning periods on modest innovation. Today’s cars may have up to 100 electronic control units (ECU) with multilayered runtime environments, multi-source software, multi-core CPU’s and million lines of software code, connected by controller area network (CAN) that steer everything from engine electronics to entertainment systems.

The Need and Challenges of an International and National Approach to Cybersecurity

The growing complexity of the interconnectedness of physical and virtual infrastructure – servers, databases, microchips, cables, mobile phones, cars, machines and so on – through information and communication technology (ICT) are not only diffusing globally but are of concern to many. Beyond its impact on leadership, management or institutions, there is a common fear that this development offers more and more avenues for disruptions in the “digital supply chain” and thus increases the vulnerability of the information society and the global economy to system failure….

“We’re on a Journey to not only upgrade, but also replace Core Elements of our Applications Landscape”

Interview with Dr. Rainer Sommer, Head of GI IT Germany, Managing Director Zurich Insurance Group

The new Ways of Working – Working beyond Borders

Co-Authors: Robert Betz, Thomas Baus With Generation Y a new generation of young well-educated people urges in the world of employment which has a high affinity for technology and modern means of communication. Grown up in the era of internet and smartphones, the competition between employers for the “Best” of this generation flares up in the “war for talent”.

Threat Modeling for rearchitecting Security in Cloud Computing

Co-Authors: Dr. Wolf Zimmer / Otto-Sven Gliesche Everything in a cloud is at scale, resource admission, resource authentication and authorization, resource scheduling and availability and the use of inter-cloud resources. Cloud service providers deploy amounts of infrastructure to capture economies at scale. Thus, cloud security space is still evolving, as well as the technology to implement the clouds and it cannot be overlooked that cloud technology moves faster than cloud security.

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden