Security

    OT Cybersecurity: New Threats, New Needs

    Critical infrastructure, just as other assets in the OT (operational technology) industry, is vulnerable to malware and other IT security risks. As illustrated by...

    xMR Sensors and Functional Safety

    I heard something the other day which stuck with me. Things have never changed this fast before and they will never change this slowly...

    AI-Based Security at the Endpoint

    The Internet of Things (IoT) has transformed the fabric of the world into a smarter and more responsive one by merging the digital and...

    Practical Tips for Embedded System Security

    While embedded systems tend to lack the processing horsepower of servers or even modern personal computers, the sheer number of devices is making them...

    Ransomware Victims Nearly Doubled Year over Year

    CyberRes’ Research shows that threats have rapidly evolved to target the growing threat surface of organizations that have incorporated digital into their business growth...

    Near Ironclad Protection for Analog-to-Digital Converters from Powerful Attacks

    Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on...

    Top Three Internet Security Threats

    Akamai Technologies, Inc., the cloud company, revealed three new research reports at the RSA Conference 2022. These in-depth reports focus on three of the most...

    Linux and Data Security: The Myths, Challenges, and Solutions

    Linux has come a long way since its humble beginnings as Finnish student Linus Torvalds’ pet project. With over 27.8 million lines of code...

    Top Five Trends in Privacy Through 2024

    As the number of privacy regulations worldwide continues to grow, organizations should focus on five privacy trends to help meet the challenges of protecting...

    Government to set up India Data Management Office

    The government has proposed to set up an India Data Management Office (IDMO) which will be responsible for framing, managing, reviewing, and revising the National Data Governance Framework Policy. The Ministry of Electronics and Information...

    Disarming Cyberattacks in Split Seconds

    A new method that could automatically detect and kill cyberattacks on our laptops, computers, and smart devices in under a second has been created...

    Microchip Announced its Fully Configurable Microcontroller-based CEC1736 Trust Shield

    As the market need for security evolves, platforms must also evolve quickly to defend against cyberattacks during start-up, real-time and system updates. With these...

    3i Infotech Makes Strategic Investments in Exium to Deliver 5G Capable SASE Solutions for Enterprises

    3i Infotech Inc., the USA, a step-down subsidiary of 3i Infotech Limited, a global Information Technology company, committed to accelerating business transformation, has announced a...

    Web 3.0, a more Secured Leap in the Internet Realm

    Our world has gone digital, sometimes we cannot control it. Most things about us, anything we write or talk about, our profiles are available...

    Data Security Best Practices for Electrical and Electronics Manufacturing

    Data processing has become an integral part of every business, regardless of the industry in which they operate. While the electrical and electronics manufacturing...

    Related News