Latest news with #EDR


Time of India
24-07-2025
- Automotive
- Time of India
Govt proposes location tracking devices to be mandatory for haulage tractors from October
With an aim to enhance safety, the ministry of road transport and highways has proposed to make it mandatory for all haulage tractors to be equipped with Vehicle Location Tracking Devices (VLTD) with effect from October 1, 2026. The ministry in a draft notification to further amend the Central Motor Vehicles Rules , 1989, said the VLTD shall be integrated with an RFID transceiver, capable of reading radio frequency identification data from the coupled trailer and transmitting it to the backend. "On or after 1st October, 2026, all haulage tractors shall be equipped with Vehicle Location Tracking Devices (VLTD) compliant with AIS-140," it said. The notification further said all trailers shall be fitted with passive RFID tags in accordance with IS 16722:2018 to enable electronic identification and pairing with tractors "On or after 1st April, 2027, all haulage tractors shall be equipped with an Event Data Recorder (EDR) to capture and store critical vehicle data," it said. According to the notification, the EDR shall be capable of recording parameters necessary for analysing operational events and enhancing safety monitoring. The ministry has given stakeholders 30 days time to comment on the draft.


Time of India
23-07-2025
- Automotive
- Time of India
Road ministry mandates location tracking devices, event data recorder on haulage tractors
In a notification to amend the Central Motor Vehicles Rules, the Ministry of Road Transport and Highways has proposed integrating the VLTD with an RFID transceiver conforming, capable of reading RFID data from the coupled trailer and transmitting it to the backend with effect from October 1, 2026. The move is aimed at enhancing operational efficiency and safety. Tired of too many ads? Remove Ads The Ministry of Road Transport and Highways has mandated all haulage tractors to be equipped with vehicle location tracking devices (VLTD) with effect from October 1, 2026, a move aimed at enhancing operational efficiency and a notification to amend the Central Motor Vehicles Rules, the ministry has proposed integrating the VLTD with an RFID transceiver conforming to, capable of reading RFID data from the coupled trailer and transmitting it to the backend.'All trailers shall be fitted with passive RFID tags to enable electronic identification and pairing with tractors,' it said in the draft notification dated July 23, draft changes will be finalised within 30 it has also mandated all haulage tractors to be equipped with an event data recorder (EDR) to capture and store critical vehicle data with effect from April 1, 2027.'The EDR shall be capable of recording parameters necessary for analysing operational events and enhancing safety monitoring,' it said, directing the concerned authority to suitably amend the existing norms to incorporate the requirements for this application on or before December 31, 2025.


Time of India
23-07-2025
- Business
- Time of India
ICICI Lombard Moves Disaster Recovery to New AWS Centre in Hyderabad
Mumbai: ICICI Lombard has shifted its disaster recovery (DR) operations from Amazon Web Services' (AWS) Mumbai region to the Hyderabad region, completing a major upgrade of its business continuity infrastructure. The fully automated, cloud-native setup—developed in collaboration with AWS—covers all of the insurer's business-critical applications and ensures rapid failover in the event of a disruption. The transition, aimed at improving service reliability and response time, was carried out with end-to-end automation and real-time validation, involving minimal manual intervention. According to Girish Nayak, chief – technology, health UW and claims at ICICI Lombard, the company successfully executed a full-site DR drill, seamlessly transitioning all business applications to the secondary cloud region. 'This marks a first-of-its-kind initiative in the Indian insurance sector,' he said, adding that the move validated the company's readiness to maintain uninterrupted operations during unforeseen events. The upgraded system uses native AWS services such as Elastic Disaster Recovery (EDR), AWS Step Functions and infrastructure-as-code tools. It supports continuous replication of application and database servers between the primary site in Mumbai and the DR site in Hyderabad, with seamless environment switching enabled via domain-based routing. Kiran Jagannath, head – FSI and conglomerates, AWS India and South Asia, said the collaboration helps secure ICICI Lombard's mission-critical workloads while enabling faster recovery, greater reliability and better data protection. Stay informed with the latest business news, updates on bank holidays and public holidays . AI Masterclass for Students. Upskill Young Ones Today!– Join Now

Associated Press
21-07-2025
- Business
- Associated Press
AV-Comparatives Publishes World's Largest Independent Enterprise Cybersecurity Solution Test
17 Top-Tier Enterprise EPP, EDR, and XDR Solutions Evaluated in the Most Comprehensive ISO 9001:2015-Certified Public Assessment to Date INNSBRUCK, Austria, July 21, 2025 /PRNewswire/ -- AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its Enterprise Security Test 2025 (March to June). This is the most extensive public evaluation to date of enterprise endpoint protection platforms (EPP), endpoint detection and response (EDR), and extended detection and response (XDR) solutions. Seventeen high-performing enterprise-grade cybersecurity products were rigorously evaluated using real-world attack simulations and scientifically sound methodologies, offering a comprehensive view of modern endpoint defence capabilities. The report includes individual product descriptions that outline key strengths and capabilities to help IT decision-makers select the most suitable solution based on their organisation's size, infrastructure, and security priorities. What Sets This Test Apart? Unmatched Scope: This is the largest public comparative test of enterprise EPP, EDR, and XDR solutions globally. Only mature, high-performing products were included. These had already demonstrated consistent reliability and strong protection in previous assessments. Holistic Analysis: Each product was evaluated across four mission-critical dimensions: To support enterprise IT leaders, the report includes an extensive feature matrix (page 57) detailing the core and advanced capabilities of each tested solution. This includes management interfaces, deployment models, threat response tools, and third-party integration support, helping organisations make informed side-by-side comparisons. All evaluated products represent enterprise-ready solutions that meet modern protection standards. Each product received the AV-Comparatives Approved Enterprise Product Seal, recognising their proven security effectiveness, operational reliability, and readiness for large-scale deployment. Peter Stelzhammer, co-founder of AV-Comparatives, commented: 'CISOs and IT leaders face complex, fast-evolving threats. Independent validation is not a luxury – it is essential. This test series provides evidence-based insights into how EPP, EDR, and XDR solutions perform in the field. We apply strict, scientifically grounded methodologies to help enterprises choose wisely.' Access the full test report: AV-Comparatives' enterprise test series is ISO 9001:2015 certified for the scope of Independent Tests of Cybersecurity Solutions. It is globally trusted by CISOs, analysts, and IT leaders as the benchmark for unbiased, rigorous cybersecurity evaluation. Cybersecurity and antivirus test results are available at for leading vendors including: Avast, AVG, Avira, Bitdefender, Check Point, Cisco, CrowdStrike, Elastic, Fortinet, F-Secure, ESET, G DATA, Gen Digital, Google, Intego, K7 Computing, Kaspersky, Malwarebytes, ManageEngine, McAfee, Microsoft, NetSecurity, Nord Security, Norton, Palo Alto Networks, Rapid7, SenseOn, Sophos, Total Defense, TotalAV, Trellix, Trend Micro, VIPRE, WithSecure, and many more. Media contact: Peter Stelzhammer, [email protected] +43512287788 Photo: Logo: View original content to download multimedia: SOURCE AV-Comparatives


Forbes
21-07-2025
- Business
- Forbes
A Year After The Outage For Healthcare CIOs
This photograph shows screens displaying the logo of "CrowdStrike" cybersecurity technology company ... More in Paris on July 19, 2024, AFP via Getty Images A JAMA study examined the impact of last year's CrowdStrike outage by surveying 2,232 hospitals and found that more than a third experienced significant system downtimes caused by a faulty cybersecurity update from the vendor. The outage disabled lab systems, disrupted scheduling tools, and cut off access to electronic health records in hundreds of hospitals. CIOs faced more than just disruption; the crisis forced them to rethink how they manage automatic system updates. Over the past year, CrowdStrike has focused its product development on two key areas that matter most to CIOs. CrowdStrike enhanced system safety and self-recovery by developing sensors for Windows and macOS to detect update failures, automatically enter safe mode, or activate CrowdStrike's remediation toolkit to restore operations without manual intervention. Second, CrowdStrike redesigned its update control system, allowing organizations to decide exactly when and how to deploy sensor and content updates. The new content control capabilities enable customers to manage updates with greater flexibility through host group policies, allowing them to set different deployment schedules for test systems, workstations, and mission-critical infrastructure. CrowdStrike also launched content pinning, a feature that lets customers lock their systems to specific content versions. This gives them precise control over when and how they deploy updates. Content pinning reinforces the CIO's responsibility to establish strict IT change management policies before rolling out any updates or modifications. Healthcare CIOs should continue investing in security EDR solutions, as these tools extend beyond traditional antivirus. EDR delivers advanced threat detection, investigation, and response capabilities directly on endpoint devices, including laptops, desktops, servers, and cloud workloads. Below are four advantages for CIOs in investing in an EDR. One advantage of EDR is its ability to answer a critical question during a suspected attack: What happened on this machine ? EDR tools actively monitor system activity in real-time and log everything, from user behavior to configuration changes. When a threat appears, IT teams can trace every action, such as a user downloading a suspicious file or running an unauthorized script. The visibility allows the IT and security team to respond quickly. EDR also reveals what processes ran on a machine, which is essential for identifying suspicious activity. Processes are programs or services that run in the background, and attackers often rely on legitimate-looking ones to conceal malicious actions. By monitoring and logging every process, EDR helps IT identify unusual behavior, such as a text editor attempting to access system files or a browser launching unknown scripts, that traditional tools might overlook. A third benefit is detecting whether any code injection or persistence attempt has occurred. Code injection occurs when an attacker inserts malicious code into a trusted application to gain control. Persistence refers to techniques that prevent malware from being removed from a system even after a reboot. EDR tools flag these behaviors in real-time, giving IT a chance to isolate and remove threats before they can take hold. Finally, EDR tracks what domains were contacted by the device. If a machine starts talking to a suspicious or known malicious website, EDR tools immediately log and alert on that connection. This helps the security and IT team ensure data isn't being exfiltrated and gives their teams a clear picture of the attack's scope and origin. EDR equips organizations with the intelligence they need to transition from reactive defense to proactive control, and healthcare CIOs must determine how to make that investment. We have just passed the one-year mark since the CrowdStrike outage, and hopefully, healthcare CIOs have made some adjustments to their security programs to minimize any future similar outages.