• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • About
    • Contact
    • Privacy
    • Terms of use
  • Advertise
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Features list
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsor an article
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Subscribe to Newsletter

Robotics & Automation News

Where Innovation Meets Imagination

  • Home
  • News
  • Features
  • Editorial Sections A-Z
    • Agriculture
    • Aircraft
    • Artificial Intelligence
    • Automation
    • Autonomous Vehicles
    • Business
    • Computing
    • Construction
    • Culture
    • Design
    • Drones
    • Economy
    • Energy
    • Engineering
    • Environment
    • Health
    • Humanoids
    • Industrial robots
    • Industry
    • Infrastructure
    • Investments
    • Logistics
    • Manufacturing
    • Marine
    • Material handling
    • Materials
    • Mining
    • Promoted
    • Research
    • Robotics
    • Science
    • Sensors
    • Service robots
    • Software
    • Space
    • Technology
    • Transportation
    • Warehouse robots
    • Wearables
  • Press releases
  • Events

security

Understanding Social Engineering and 5 Ways to Combat it

January 17, 2024 by Mark Allinson

Cybersecurity has two broad sources of breaches: the human element and the technical element. Technical elements involve loopholes or vulnerabilities in an application, network, program, and so on. On the other hand, the human element involves errors and insecure practices on a user’s part.

Social engineering is a strategy employed by attackers to precipitate security mistakes. They use human psychology to trick web users into revealing sensitive information or granting access.

As such, they capitalize on the human element to compromise cybersecurity. Read on to learn how cybercriminals use social engineering and how to defeat it. [Read more…] about Understanding Social Engineering and 5 Ways to Combat it

Filed Under: Culture Tagged With: authentication, engineering, manipulation, mistakes, multifactor, password, security, social, strategy

Geofencing and its Role in Layered Counter Drone Solutions

January 4, 2024 by David Edwards

Imagine a future where drones only fly when invited and under boundaries drawn digitally across the sky. This is the new reality that airspace management is redefining thanks to geofencing, a technological marvel.

This article explores the many uses of geofencing as a component of a multi-layered counter drone solution, assisting organizations in preventing unwanted incursions and optimizing drone-powered services.

Are counter-drone solutions essential?

Drones could pose significant security issues, such as interfering with privacy rights or interrupting vital operations. This is the developing drone age reality, and to protect our skies and ground, we need effective counter-drone technologies. [Read more…] about Geofencing and its Role in Layered Counter Drone Solutions

Filed Under: News Tagged With: counter, drone, geofencing, implementation, layered, security, solutions, uses

Enhancing Security Through Comprehensive Identity Management

December 27, 2023 by Mark Allinson

In today’s interconnected world, where digital footprints shape our reality, the safeguarding of online identities is not just a concern but a necessity.

The digital realm, vast and pervasive, has transformed the way we live, work, and interact, placing identity management at the forefront of cybersecurity.

In this digital landscape, a single vulnerability can lead to catastrophic breaches. A staggering 81% of data breaches are attributed to weak or stolen passwords, underscoring a critical vulnerability in our digital defenses.

This vulnerability points to a broader issue – the need for robust identity and access management (IAM) systems. [Read more…] about Enhancing Security Through Comprehensive Identity Management

Filed Under: News Tagged With: advancements, comprehensive, culture, enhancing, identity, lifecycle, management, orgnaizational, security, technological

Cybersecurity of Robotic Systems: Top 5 Terms You Need to Know

December 1, 2023 by Mark Allinson

Learn how to improve and elevate the cybersecurity of robotic systems and prevent security breaches with the help of our quick cybersecurity glossary.

Robotic systems might seem impenetrable, but reports show that cybercriminals are finding new ways to exploit vulnerabilities, which results in data breaches.

Nowadays, most systems are connected to the internet, and that serves as a gateway to hackers who are always searching for system weaknesses. [Read more…] about Cybersecurity of Robotic Systems: Top 5 Terms You Need to Know

Filed Under: Robotics Tagged With: cyber, cybercriminals, cybersecurity, exploit, glossary, robotic, security, systems, vulnerabilities

Signs that Show it’s Right Time to Invest in Software Product Development

November 22, 2023 by Mark Allinson

In this digital era, imagining business operations without software is impossible. For most startups and small & mid-sized enterprises, there comes a point when opting for software product development becomes the need of the hour.

Investing in software product development is not necessary for the company’s growth but also for satisfying the customers with cutting-edge solutions.

These days, companies rely heavily on software product development to expand their customer base. Software product development companies also entice their clients with their offerings and reflect the advanced industry developments and upgrades. [Read more…] about Signs that Show it’s Right Time to Invest in Software Product Development

Filed Under: Software Tagged With: architecture, company, development, product, SaaS, security, software-as-a-service

How to Secure Your WordPress Site in 2023

October 30, 2023 by Mark Allinson

In the developing computerized world, site security has ended up being a higher priority than at any other time.

WordPress, being one of the most popular substance the board frameworks internationally, is a great objective for programmers. Thus, guaranteeing the security of your WordPress site is vital.

In this article, we will walk you through the critical stages to shield your WordPress site in 2023. We will separate complex thoughts into absorbable pieces, making them helpful to try and individuals with restricted specialized understanding. [Read more…] about How to Secure Your WordPress Site in 2023

Filed Under: Computing Tagged With: automation, data, methods, secure, security, site, table, website, wordpress

To What Degree Should You Outsource Your Logistics?

October 26, 2023 by David Edwards

Unless you offer a solely digital-based product or service, logistics will need to be factored into your business plan.

For the most part, it’s easy to use third parties for a great number of these services. For example, you might use a third-party courier service to deliver your custom products to clients.

But that’s not the end of the story. After all, some companies may have more in-depth logistical needs, perhaps running trucks on the road seven days a week, or using custom vehicles to transport sensitive goods from one place to another. [Read more…] about To What Degree Should You Outsource Your Logistics?

Filed Under: Logistics Tagged With: chain, data, logistics, outsource, outsourcing, security, supply

How to Elevate Your Business Strategy with Smart Security Cameras

October 23, 2023 by Mark Allinson

Did you know? According to Streamline Telecom, businesses are 4 times more likely to be robbed than homes. As the data demonstrates the heightened risk, surveillance plays a pivotal role in protection.

This is where smart security cameras come into the picture. The role of security cameras in business goes beyond just safety. They can be a strategic asset.

Smart security cameras for businesses can provide operational insights, deter theft, and create a safer workplace. But modern smart camera technology for business offers more strategic benefits beyond security. [Read more…] about How to Elevate Your Business Strategy with Smart Security Cameras

Filed Under: Infrastructure Tagged With: business, cameras, security, smart, strategy

A Comprehensive Guide to Data Masking: Types and Techniques

October 6, 2023 by Mark Allinson

In the present-day scenario, data breaches happen often. Companies must consider it with the utmost importance to protect their data and implement cutting-edge technologies for data protection.

Data masking is a technique that ensures security as it hides sensitive information in databases and apps to prevent theft. The original data’s format and usefulness are maintained.

This guide covers all you need to know about advanced masking techniques. We’ll discuss the types of available, essential methods like tokenization, best practices, examples, and future trends. [Read more…] about A Comprehensive Guide to Data Masking: Types and Techniques

Filed Under: Computing Tagged With: data, dynamic, masking, security, static, techniques, theft, tips

The Ultimate Guide to Free VPNs, Chrome VPNs, and Planet Free VPN

October 2, 2023 by Mark Allinson

In an age where online privacy and security are paramount, virtual private networks (VPNs) have become a necessity. VPNs not only protect your data but also grant access to geo-restricted content.

While premium VPN services abound, there is also a range of free options available. In this article, we’ll delve into the world of free VPNs, free Chrome VPN extensions, and even explore the intriguing concept of Planet free VPN. [Read more…] about The Ultimate Guide to Free VPNs, Chrome VPNs, and Planet Free VPN

Filed Under: Software Tagged With: network, online, privacy, private, security, virtual, vpn

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Search this website

Latest articles

  • Canadarm2 grapples Cygnus XL in key robotic arm manoeuvre at the ISS
  • Autonomous underwater waste collection soon to be a reality
  • Italian Institute of Technology develops robot for vineyard applications
  • Flexiv to make largest appearance yet at China International Industry Fair
  • Why Well Fitted Construction Uniforms Are Becoming a Safety Imperative?
  • Inspection and maintenance robots: Reaching the unreachable and dangerous
  • Fugro and NOAA partner to advance remote deep-ocean mapping
  • Meiko Group partners with Fizyr and Yaskawa Europe on automated dishwashing
  • The Precision Engineering Foundations of Next-Generation Robotics
  • ABB to invest an extra $110 million in US manufacturing

Secondary Sidebar

Copyright © 2025 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT