Print Edition of the Magazine, Available from JANUARY 2023 onwards, Contact us to subscribe.
Login with your registered email.
If incase your password is not working we request you to please reset your password.
Login with your registered email or social accounts.
Register here to explore the world of automation.
Enter your username / registered email address to recover your password.
The study is based on responses from over 1,000 business decision makers in India, Australia, New Zealand, Singapore, an
On 5th August 2020, USA government has announced the Expansion of the Clean Network to Safeguard America’s Assets. The
According to researchers, these vulnerabilities have impacted to all Mercedes-Benz connected cars in China over 2 millio
Recent report published by leading cybersecurity firm Trend Micro in partnership with researchers at the Polytechnic Uni
Have you patched SAP system? Cybercriminals are doing massive internet scans for SAP systems affected by RECON Vulnerabi
According to recent studies, many PDF Applications are found vulnerable to Shadow attack. The trick behind any Shadow At
Botnet is known as “Zombie Army” in Cybercrime world. After around five months of silence, again dangerous Emotet Bo
What is Vulnerability Assessment & Penetration Testing (VAPT), what is importance of it to any organization and what are
Companies in the global market are focuses to use automated technology based on autonomous principles are primarily disr
Due to current COVID-19 Lockdown situations worldwide, since 2020 year start Zoom has seen a high increase of new monthl
Snake ransomware variant is designed to target industrial control systems. It is harmful to processes of SCADA systems,
Businesses in the world all have some issues that can embrace and optimize through the use and adoption of digital trans
Connected devices are network-connected devices focused to maintain a connection between two or more platforms to furthe
Threat Intelligence or cyber threat intelligence is an internet-based concept used for organizations to understand the t
Reliance on digital infrastructure due to increased shift on remote working increasing cybersecurity risk mainly because
At present, TikTok has become the fastest growing social media channel worldwide which draws an alternative version of o
Huawei that has been caught in the crossfire of a larger US-China trade and technology war, has quietly delivered masks
Enterprises in the current scenario are rushing to keep their businesses working, which is creating a significant risk t
Ministry of Electronics & IT and DSCI launched ‘Cyber Security Grand Challenge’ with combined prize money of INR 3.2
© 2019 IED Communications Ltd | All right reserved. www.industrialautomationindia.in