In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Evaluation tests from BMW revealed that by integrating Intel® Active Management Technology, BMW could significantly increase its remote management capabilities and further strengthen security.
This paper examines the major considerations manufacturers looking to add, upgrade of replace Enterprise Resource Planning (ERP) software should be aware of. By being cognizant of these aspects you'll ensure that you'll be able to select a solution that best fits your needs, both now and in the future.