• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • About
    • Contact
    • Privacy
    • Terms of use
  • Advertise
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Features list
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsor an article
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Subscribe to Newsletter

Robotics & Automation News

Where Innovation Meets Imagination

  • Home
  • News
  • Features
  • Editorial Sections A-Z
    • Agriculture
    • Aircraft
    • Artificial Intelligence
    • Automation
    • Autonomous Vehicles
    • Business
    • Computing
    • Construction
    • Culture
    • Design
    • Drones
    • Economy
    • Energy
    • Engineering
    • Environment
    • Health
    • Humanoids
    • Industrial robots
    • Industry
    • Infrastructure
    • Investments
    • Logistics
    • Manufacturing
    • Marine
    • Material handling
    • Materials
    • Mining
    • Promoted
    • Research
    • Robotics
    • Science
    • Sensors
    • Service robots
    • Software
    • Space
    • Technology
    • Transportation
    • Warehouse robots
    • Wearables
  • Press releases
  • Events

security

Modern cybersecurity solutions: SIEM or MSSP?

May 1, 2023 by Mark Allinson

What does SIEM mean?

SIEM (Security Information and Event Management) – the definition is that it is a software system that allows you to detect threats and respond to security incidents. It monitors data about security events in real time and provides a historical analysis from a wide range of sources that record events and contextual data.

More advanced SIEM systems and managed SIEM providers are able to combine events from different components of the IT system together to create a new higher-level event.

The main problem for security engineers is that there is too much data to be able to get even a rough overview. That’s why we need automation to distinguish those events that pose a threat or are otherwise interesting to our business from the multitude of events. [Read more…] about Modern cybersecurity solutions: SIEM or MSSP?

Filed Under: Computing Tagged With: access, alerts, allows, analysis, compliance, data, event, events, files, log, logs, managed, monitor, monitoring, mssp, network, organizations, reports, security, siem, system, time, underdefense, user

PCI DSS Compliance: The Road Map

April 24, 2023 by Mark Allinson

When running a business that deals with online payments, protecting your customers’ data is essential. That’s why people increasingly turn to PCI Compliant solution.

Because indeed, ensuring that your business follows the Payment Card Industry Data Security Standard (PCI DSS) is one of the most important steps it can possibly take to protect customer data and ensure compliance with the payment card industry’s regulations and guidelines.

But what is the PCI DSS? What are the requirements? And how to become PCI compliant? All these questions we will try to answer in this very article. [Read more…] about PCI DSS Compliance: The Road Map

Filed Under: Technology Tagged With: cardholder, compliance, data, dss, pci, protect, requirement, security, sensitive

Importance of using a proxy checker for online security and privacy

April 21, 2023 by Mark Allinson

As internet usage continues to grow, so do the risks associated with it. Cybercriminals, hackers, and other malicious actors are constantly seeking ways to exploit vulnerabilities in online networks and systems.

One way to protect against these risks is by using proxies. However, it is important to ensure that the proxies being used are secure and reliable. This is where proxy checkers come in.

In this article, we will discuss the importance of using a proxy checker for online security and privacy. [Read more…] about Importance of using a proxy checker for online security and privacy

Filed Under: Business Tagged With: checker, online, privacy, proxies, proxy, security

SeqSense shows how it built autonomous security robots on AWS

April 9, 2023 by Mai Tao

Japanese robotics startup SeqSense has built autonomous security robots using Amazon Web Services and Amazon’s platform for robotics

According to Japan’s national institute of population and social security research, the working population in Japan is expected to decrease by 30 percent in the next 30 years. A rapidly aging population in Japan causes a shortage of labor in the security space.

SeqSense, a robotics startup company in Japan, aims to solve this challenge by providing autonomous security robot service. They developed an intelligent security robot SQ-2. that patrols inside buildings.

It navigates by itself using pre-created map of a floor, patrol multiple floors by communicating with elevators. Their robot has been deployed in more than 30 office buildings, shopping malls, and airports in Japan. [Read more…] about SeqSense shows how it built autonomous security robots on AWS

Filed Under: Features, Robotics Tagged With: amazon, aws, cloud, core, robot, security, seqsense, video

Security robots ‘deter crime and minimize risk’, says Knightscope

March 23, 2023 by Mark Allinson

The concept of automated policing began as a science fiction concept years ago, but today it is “real and impactful”, according to security robotics specialist Knightscope.

The sophistication of robot-powered security is even more interesting than sci-fi to Stacy Stephens, the co-founder and chief client officer of Knightscope.

Launched in 2013, the Mountain View, California, public safety technology services company was the first in the world to deploy mobile, fully autonomous security robots (ASRs) in public spaces such as malls, parking lots and neighborhood parks. [Read more…] about Security robots ‘deter crime and minimize risk’, says Knightscope

Filed Under: Features, Infrastructure Tagged With: asrs, autonomous, company, concept, crime, dcm, efficiency, knightscope, minimize, mobile, officer, power, provide, public, risk, robot, robots, safety, security, sensing, sensors, stephens, technology

What is SSPM and How to Properly Choose One?

February 24, 2023 by Mark Allinson

As organizations continue to shift their processes, user and corporate data, and customer relationship management (CRM) solutions to SaaS applications, the need for a robust security posture has become increasingly important.

Using an SSPM (SaaS security posture management) system is crucial to a strong security posture.

SSPM is a comprehensive solution that enables organizations to manage and monitor the security of their SaaS applications. By the end of this article, you will better understand SSPM and how it can help your organization achieve a strong security posture for your SaaS applications. [Read more…] about What is SSPM and How to Properly Choose One?

Filed Under: Computing Tagged With: access, applications, compliance, consider, management, organizations, posture, provide, SaaS, security, sspm

GXO expands partnership with Robotic Assistance Devices to enhance safety and security

February 9, 2023 by Mark Allinson

GXO Logistics, one of the world’s largest contract logistics companies, is expanding its technology partnership with Robotic Assistance Devices, a subsidiary of Artificial Intelligence Technology Solutions.

GXO is developing advanced security solutions with RAD to improve the safety and efficiency of its customers’ logistics operations.

Thomas Nelson, senior director of security at GXO, says: “GXO’s customers depend on our technological expertise and operational excellence and having a robust security program is a key part of the solution suite we offer. [Read more…] about GXO expands partnership with Robotic Assistance Devices to enhance safety and security

Filed Under: Infrastructure, News Tagged With: advanced, customers, devices, enhance, gxo, logistics, partnership, rad, robotic, safety, security, solutions, technology

Hacking Robots: The 5 Threats You Need to Know About

February 6, 2023 by Mark Allinson

Robots have already flipped manufacturing industries on their heads in the last couple of decades. With the potential to revolutionize everything from the military and law enforcement to education, it’s vital to take stock of the security risks that come with increased automation.

Manufacturing companies are the second biggest target for ransomware gangs. If robots are vulnerable to attack, money-hungry criminals will find a way to disrupt factories and demand payment to restore systems.

Where exactly do the risks to robots and automation systems come from? We’re going to explore who is likely to exploit issues in system confidentiality, integrity, availability, and authentication. [Read more…] about Hacking Robots: The 5 Threats You Need to Know About

Filed Under: Computing Tagged With: authentication, automation, connections, data, process, processes, risks, robotics, robots, security, systems, work

How to Enhance Cyber Security Awareness for Remote Teams (5 Tips)

January 27, 2023 by Mark Allinson

Remote teams are exposed to more cyber security threats due to an expanded attack surface. With an exponential increase in the number of endpoints, cybercriminals can gain access to sensitive company data.

Enhancing cybersecurity awareness for remote teams is essential, and here are five tips to help with this. [Read more…] about How to Enhance Cyber Security Awareness for Remote Teams (5 Tips)

Filed Under: Computing Tagged With: awareness, cyber, employees, policies, remote, security, teams, threats, training

How to Protect Your Business From Hacking

December 23, 2022 by Mark Allinson

In this internet age, no business is unhackable. Hackers are growing at a fast pace, even as technology advances. Most of these hackers could hack into any system, and their activities can hardly be contained if measures haven’t been implemented to prevent their attacks.

You could leverage the Secure Access Service Edge (SASE) architecture and use cloud delivery solutions to prevent hackers from gaining access to your corporate system. Find out more on SASE here: https://nordlayer.com/learn/sase/what-is-sase/.

Hackers are constantly trying to exploit weak spots in websites, applications, and emails, and they build on them until they grow stronger. If we eliminate easy-to-hack spots from our websites and apps, then that will frustrate their efforts, and they will have to look elsewhere. This article will give you an edge in avoiding and preventing hackers by protecting your system. [Read more…] about How to Protect Your Business From Hacking

Filed Under: Business Tagged With: access, admin, attacks, authentication, business, businesses, cloud, company, default, devices, employees, essential, hackers, password, passwords, Phishing, private, secure, security, software, system, website, websites

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Search this website

Latest articles

  • Canadarm2 grapples Cygnus XL in key robotic arm manoeuvre at the ISS
  • Autonomous underwater waste collection soon to be a reality
  • Italian Institute of Technology develops robot for vineyard applications
  • Flexiv to make largest appearance yet at China International Industry Fair
  • Why Well Fitted Construction Uniforms Are Becoming a Safety Imperative?
  • Inspection and maintenance robots: Reaching the unreachable and dangerous
  • Fugro and NOAA partner to advance remote deep-ocean mapping
  • Meiko Group partners with Fizyr and Yaskawa Europe on automated dishwashing
  • The Precision Engineering Foundations of Next-Generation Robotics
  • ABB to invest an extra $110 million in US manufacturing

Secondary Sidebar

Copyright © 2025 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT