article thumbnail

Full Steam Ahead: CIO Kopal Raj of WABTEC on staying ‘on-track’ with AI, IoT and sustainability goals

CIO Business Intelligence

With a mission to revolutionize the future of global mobility, WABTEC delivers transformative transportation systems that quite literally propel the world forward. As a major transportation player in the industry, we have signed up to reduce the carbon footprint generated by locomotives and passenger trains.

article thumbnail

Technology Short Take 155

Scott Lowe

If I’m understanding the article correctly (and feel free to correct me if I am mistaken) it looks as if Cilium Service Mesh will leverage/does leverage a combination of certificate-based mTLS for identity at the workload level and node-based transport encryption (via WireGuard) for data confidentiality. Servers/Hardware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO Business Intelligence

To ensure the security of your cloud applications, infrastructure, and operating systems, it’s important to schedule regular vulnerability scans and penetration tests. It is also crucial to promptly apply patches and updates to protect your systems against known risks.

Security 132
article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. It also ensures that an enterprise’s encryption keys are protected by an advanced hardware security module.

Security 150
article thumbnail

Technology Short Take 116

Scott Lowe

Servers/Hardware. Although I’ve by and large moved away from Apple hardware (I still have a MacBook Pro running macOS that sees very little use, and a Mac Pro running Fedora), I did see this article regarding a new keyboard for the MacBook Air and MacBook Pro. Operating Systems/Applications.

Storage 60
article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

The Client to Authenticator Protocol (CTAP) describes how a browser or operating system establishes a connection to a FIDO authenticator. While roaming authenticators (hardware keys) are available, for most use cases, platform authenticators (like the ones built into your smartphone or laptop) are sufficient.

article thumbnail

First job lessons: Seattle tech startup CEOs on what they learned from car washing, delivery, and more

GeekWire

Device driver and E/PROM programmers are closest to the hardware, and that bottoms-up understanding how a computer operates — from booting to loading the OS, to launching apps and beyond — is still immensely valuable, even in the era of cloud and AI/machine learning!”. Transportation analyst at Cambridge Systematics.”.