The compromise of the SolarWinds Orion Network Configuration Manager Update (referred to as Orion onward) has been in the news since its discovery in December 2020. The impact of this cyberattack on a software supply chain (attacking a vendor’s software update build) is quite extensive and poses a significant risk for the downstream customers. The sophistication of the attack and the organizations that were ultimately targeted is astonishing and terrifying. However, this is only the tip of the iceberg. How deeply an organization has been compromised or what intellectual property was exfiltrated is yet to be fully determined.
The owner of a consumer electronics company locks the doors and arms the burglar alarm system and the end of a workday. Later that night, she receives a call from the police informing her that thieves have driven a truck straight through a loading dock door, filled the truck with the most popular video gaming system products and left the scene before they could respond.
Medicine plays a vital role in safeguarding public health throughout the world. Pharmaceutical companies develop medicines to treat and cure sickness and disease. However, despite these noble intentions, occasionally substances created for a specific therapeutic purpose become dangerous. Heroin, for example, was introduced in 1898 as a therapeutic drug but was later determined to be highly addictive, leading to significant abuse. Since then, numerous pharmaceuticals products developed for specific therapeutic uses have been proven to be moderately to highly addictive, resulting in overdoses and deaths.
The idea of being effortlessly chauffeured by self-driving cars or autonomous vehicles (AV), has been a dream of futurists for several decades. They envision a time where we will simply input our destination and be safely driven there while we do work, relax, watch a movie, or even take a nap. Commercially, trucks will self-drive in platoon formations 24 hours a day transporting goods from one part of the country to another.
Protecting and controlling access- whether to an office building or an operating system- is an ever evolving security challenge. With ongoing advancements in technology, the option to utilize biometric security controls is becoming more widely available.
3D printing technology is probably one of the greatest inventions of our lifetime. Given its potential “to revolutionize the way we make almost everything,”1 it is developing rapidly. That evolution has repositioned this once prohibitively expensive resource as affordable, making it accessible to many, manufacturers and consumers alike. The immediate challenge that people new to 3D printing face is distinguishing between its different processes and materials. In fact, the term 3D printing is actually an umbrella term that encompasses a variety of 3D printing processes. This paper will focus on 3D metal printing.
In 2003, the National Institute of Health’s (NIH) “Human Genome Project” (HGP) announced that it had completed its research involving the mapping of the entirety of the human genome. It revealed that there are over 20,000 individual genes in the human body, providing scientists and others with detailed information about the structure, organization and function of the human genome, along with a basic set of genetic patterns for the development and function of a human being.
This paper is part 1 of 2 we have authored on the topic of blockchain. Part 1 delves into more detail on the technology of a blockchain and how it operates.
This paper is part 2 of 2 on the topic of blockchain. Part 1 provides technical insight on the blockchain technology that is the foundation of the Bitcoin and Ethereum cryptocurrencies, one of the most recognizable applications of blockchain technology. Part 2 is less technical as it reviews different types of blockchain platforms, business applications using this technology and how it may soon revolutionize certain enterprise and consumer transactional processes.
Ransomware has featured prominently in the news over the last few years. Hospitals, municipalities, businesses, law enforcement agencies, individuals and even entire regions of the world have been affected by it. Some have paid the ransom and recovered their computer data; others have lost their data forever.
Intact Insurance Specialty Solutions is the marketing brand for the insurance company subsidiaries of Intact Insurance Group USA LLC. Coverages may be underwritten by one of the following insurance companies: Atlantic Specialty Insurance Company, a New York insurer; Homeland Insurance Company of New York, a New York insurer; Homeland Insurance Company of Delaware, a Delaware insurer; OBI America Insurance Company, a Pennsylvania insurer; OBI National Insurance Company, a Pennsylvania insurer; or The Guarantee Company of North America USA, a Michigan insurer. Each of these insurers maintains its principal place of business at 605 Highway 169 N, Plymouth, MN 55441, except The Guarantee Company of North America USA, which is located at One Towne Square, Southfield, MI 48076. This material is intended as a general description of certain types of insurance coverages and services. Coverages and availability vary by state; exclusions and deductibles may apply. Please refer to your insurance policy or consult with your independent insurance advisor for information about coverages, terms and conditions. Some coverage may be written by a surplus lines insurer through a licensed surplus lines broker. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds.