
Public transport systems are becoming more dependent on digital technology, making the risk of cyberattacks increasingly real. Therefore, operators must prioritize security measures to protect these digital systems from malicious actors.
Public transport systems are becoming more dependent on digital technology, making the risk of cyberattacks increasingly real. Therefore, operators must prioritize security measures to protect these digital systems from malicious actors.
The commercial highlights how IBM is protecting enterprises everywhere, from major transit systems to international energy companies, “because the evolving threat landscape shouldn't take your focus away from your evolving business.”
This year’s program featured a technical tour of Honolulu’s new rail system, a speed networking session, a roundtable with some of the top CEOs, a look at cybersecurity, a meeting for BMBG members, and much more.
The new study focuses on the role of vendors in cybersecurity and their relationships with the transit industry. Through detailed interviews and in-depth research, the team reported on several key findings.
The authors’ findings focus on cyber literacy and procurement practices, the lifecycle of technology vis-à-vis transit hardware, and more.
The app will help protect Metro riders and other L.A. County residents and visitors from growing cybersecurity threats on public Wi-Fi systems.
MTI perspective emphasizes the need for robust cybersecurity practices to protect personal data and the transit industry from cyber threats.
The so-called “Alliance for Availability” aims to solve the complexity challenge through collaboration and brings together the most diverse service-related processes, technologies, and expertise in an open ecosystem.
Now, more than ever, cybersecurity is vitally important for public transit agencies.
Between June 2020 and June 2021, the transportation industry witnessed a 186% increase in weekly ransomware attacks. As such, it is even more imperative that transit operators treat cybersecurity with the same seriousness as physical operational security.
The secure and easy all-access connection to your content.
Bookmarked content can then be accessed anytime on all of your logged in devices!
Already a member? Log In