MicroEJ streamlines IoT software development with an

BOSTON, Mass., July 05, 2022 (GLOBE NEWSWIRE) — MicroEJ, a leader in software enablement solutions for IoT and embedded devices, today announces the availability of its standard Virtual Execution Environment, MICROEJ VEE, for Thales Cinterion® IoT Module and Plug and Play IoT Device… Source: www.globenewswire.com – Read more
AITX’s Subsidiary Robotic Assistance Devices Comments on

Detroit, Michigan, July 05, 2022 (GLOBE NEWSWIRE) — Artificial Intelligence Technology Solutions, Inc., (OTCPK:AITX), today announced that its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD) has experienced its largest order intake month during June 2022. “Our sales team… Source: www.globenewswire.com – Read more
China Data Protection Law Enforcement Forecast

What would be the priorities of law enforcements in terms of data protection in the next 18 months in China? As many draft laws and regulations as well as the implementation regulations for the Personal Information Protection Law (the “PIPL”) have yet been released nor finalized, many… Source: www.lexology.com – Read more
Four Steps To Robust Clinical Cybersecurity

Healthcare systems in the region have been plagued by cyber attacks in the last few years.In April 2021, a cyber attack on UnitingCare Queensland left four hospitals and several aged-care homes without any access to patient records. Just one month prior, a cyber attack on Eastern Health forced… Source: www.cpomagazine.com – Read more
Over Half of Medical IoT Devices Found Vulnerable to Cyberattacks

After a year of unprecedented cyberattacks on several hospitals and medical centers across the globe, the health care sector has become a primary target to threat actors. In addition to exploiting patients’ data and disrupting hospital networks, cybercriminals are now… Source: news.google.com – Read more
Fixing eCommerce with ‘Story-Based’ Analytics

The chain of command in eCommerce is made up of links. And those links go something like this: A consumer registers with a merchant, places an order and chooses payment; processing goes on in the background and the customer eventually gets what they order. Simple enough in… Source: www.pymnts.com – Read […]
Meet Kevin Fu – FDA’s Acting Director of Medical Device Cybersecurity

In December 2020, we reported a data leak that potentially exposed 45 million unique medical images due to unprotected servers. It exposed the increasing vulnerability of the health care industry towards the ever-rising cyberthreats. However, the U.S. Food and Drug… Source: cisomag.com – Read more
Millions of hacking attempts daily as cybersecurity industry bleeds workers

The news: The cybersecurity field is burning out as mounting attacks take their toll.45% of senior cybersecurity professionals are considering quitting the industry due to stress from unrelenting ransomware attacks, according to Deep Instinct’s annual Voice of the SecOps report. 4 in 10 UK… Source: www.emarketer.com – Read more
Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild

Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild. The shortcoming, tracked as CVE-2022-2294, relates to a heap overflow flaw in the WebRTC component that provides real-time audio and… Source: thehackernews.com – Read more
Significant changes ahead: UK government responds to the consultation on the future of medical devices regulation

On 26 June 2022, the UK government published its response to the consultation on the future of medical devices regulation in the UK. The consultation ran between September and November 2021 (see further here). The outcome has been eagerly anticipated, not least by the industry keeping a weather… Source: www.lexology.com – Read more