-
- News
- Books
Featured Books
- pcb007 Magazine
Latest Issues
Current IssueAdvancing the Advanced Materials Discussion
Moore’s Law is no more, and the advanced material solutions to grapple with this reality are surprising, stunning, and perhaps a bit daunting. Buckle up for a dive into advanced materials and a glimpse into the next chapters of electronics manufacturing.
Inventing the Future With SEL
Two years after launching its state-of-the-art PCB facility, SEL shares lessons in vision, execution, and innovation, plus insights from industry icons and technology leaders shaping the future of PCB fabrication.
Sales: From Pitch to PO
From the first cold call to finally receiving that first purchase order, the July PCB007 Magazine breaks down some critical parts of the sales stack. To up your sales game, read on!
- Articles
- Columns
- Links
- Media kit
||| MENU - pcb007 Magazine
Elmatica Completes Cybersecurity Training with US Experts in Washington DC
November 22, 2019 | ElmaticaEstimated reading time: 3 minutes

“With a world in constant change, where cyber threats can either cripple or secure your business, it is vital that every individual, company and federal entity utilize technology and methodology to secure one’s data. The cost of data breaches increase globally every year, in this game, there is only one rule: better to be safe than sorry, “ says CEO Didrik Bech, present in Washington at the Cybersecurity Institute.
“The U.S. government is the “largest producer, collector, consumer, and disseminator of data in the world”, so learning from the experts here in Washington DC provides us with the knowledge to set our own focus at the right level, “ says IT Manager Robert Kurti.
Not enough done towards supply chain threats!
Themes like the statutory and regulatory framework for cybersecurity and contracting, cybersecurity in public, federal privacy laws and cybersecurity; cloud computing, security, and acquisitions are all elements scheduled when the Cybersecurity Institute calls for training.
“People have a tendency to consider that their cybersecurity measurements are both sufficient and up to date and this might be the case. However, how have you secured your supply chain and what data access do your subcontractors have? Not enough is done to protect against this range of supply chain threats. The supply chain threats are now understood to encompass more than counterfeit electronics and other parts,“ says Bech.
Software increasingly defines the boundaries, operation, and security of systems which are crucial to society as consumer and industrial products, transportation, healthcare, and communication. A modern airliner may have more than 10 million lines of code and a car may have 100 million lines of codes operating a wide variety of systems from engine control to break systems.
How much of your coding relies on open source?
“Electronics systems are becoming command-driven through connectors, sensors and now cloud-based. As the software is becoming more advanced, developers rely on open source for parts of their code. Are these open sources secure, are all the bits and bytes trustworthy, who has access, what can they steal, and what they can do, is practically only up to your imagination,” says Bech.
According to the “Cost of Data Breach” report, published by IBM and Ponemon Institute earlier this year, the average cost of a data breach is around $3,9 billion, a 12% increase in the last five years. Data breaches are costly and create chaos for organizations and not least their customers every year.
Is your IT-strategy left-hand work?
“As a trusted partner to industries like Automotive, Communication, Defence and Medical, where copyright protection, compliance, design, data, and drawings are key to securing your upper edge, there is no way to handle your IT Security like a left-hand project. Policy and risk management is an important component of any organizations’ operations. Documenting issues and developing plans of action are important in managing your cybersecurity risk,” says Bech.
The Internet of Threats—be aware
The Internet of Things (IoT) or Internet of Threats, is establishing and producing an insurmountable amount of interconnections of sensors, devices and systems, and potential massive interdependencies among systems.
“These connections and pathways for attacks, malware propagation and distribution will grow exponentially. Detection and response to these attacks will be a pivotal part of security for all companies. Hacks resulting in exposure of private information as Sony in 2014, the Office of Personnel Management in 2015 or Equifax in 2017 shows how unwanted actors can gain access. The result was that hundreds of millions of personnel records were breached and compromised, “ says Bech.
Secure your products—you don’t want valuable research stolen
Take control of your products and services, secure your Intellectual Property Rights (IPR), select partners with the capability or minimum the structure to optimally secure your supply chain.
“We have experienced a sharp increase in requests from existing and new customers regarding our data handling procedures, how we operate and which systems we are using. These requests are coming from all industries and especially from product owners who have an active strategy to secure their products and services by reducing the possibility of other companies stealing their hard-earned research & development investments,” says IT Manager Robert Kurti.
Testimonial
"The I-Connect007 team is outstanding—kind, responsive, and a true marketing partner. Their design team created fresh, eye-catching ads, and their editorial support polished our content to let our brand shine. Thank you all! "
Sweeney Ng - CEE PCBSuggested Items
AI-Powered Wearables Transform How Consumers Interact with Everyday Technology
09/15/2025 | PR NewswireThe global demand for AI-driven, touchless wearable technologies is accelerating as consumers seek more natural, seamless and intuitive ways to interact with their devices. Traditional touch screens and voice assistants, while effective, are increasingly viewed as limiting in a world where multitasking, mobility and efficiency are key. As industries from consumer electronics to augmented reality and enterprise computing embrace the possibilities of gesture-based control, the market for neural interfaces is rapidly expanding
Kopin Announces $9 Million Follow-On Contract for Defense Thermal Imaging Assembly
08/14/2025 | BUSINESS WIREKopin Corporation, a leading provider of application-specific optical systems and high-performance microdisplays for defense, training, industrial, consumer and medical products, today announced the award of an approximate $9 million follow-on production contract in support of a custom thermal imaging assembly build for a major U.S. defense prime contractor.
Mouser Electronics Receives Top Global Distributor, Growth Awards from HARTING
08/01/2025 | Mouser ElectronicsMouser Electronics, Inc., the authorized global distributor with the newest electronic components and industrial automation products, has been honored with HARTING's prestigious Global High Service Distributor of the Year Award. Mouser also received the Distinguished Award for New Product Sales Growth. The awards were presented at HARTING's recent 2025 Distribution Summit in Louisville, Kentucky.
DigiKey Expands Inventory with Over 32,000 Stocking NPIs in Q2 2025
07/31/2025 | Digi-KeyDigiKey, the leading global electronic components and automation products distributor, extensively expanded its in-stock products available for same-day shipment by adding more than 32,000 innovative new product introductions (NPIs) in the second quarter of 2025.
It’s Only Common Sense: Selling to Today's Generation of Buyers
06/30/2025 | Dan Beaulieu -- Column: It's Only Common SenseMillennials and Gen Z hold significant purchasing power and influence in industries worldwide. Selling to them requires adapting to their unique preferences, behaviors, and values, and exploring their buying habits, embracing their emphasis on social values, and mastering digital communication. Unlike previous generations, they prioritize experiences, sustainability, and value.