Security

    Top 10 Agentic AI Threats and How to Defend Against Them

    Author: Saugat Sindhu, Global Head – Advisory Services, Cybersecurity & Risk Services, Wipro Limited October is Cybersecurity Awareness Month, and this year, one emerging frontier demands...

    Infineon’s PQC-certified contactless and dual-interface security controller supports a quantum-safe world

    Quantum computers are expected to become powerful enough within the next decade to compromise many of today's cryptographic algorithms, putting a wide range of...

    Securing Aerospace & Defense Software: The Critical Role of SBOMs

    Satellites, spacecraft, and defense systems rely on increasingly complex software ecosystems that integrate open-source, third-party, and legacy components. Recent cybersecurity events have highlighted how...

    Matter 1.4.2 Introduces Stronger Security for Smart Homes

    As Smart Homes are getting more connected, strong security is overdue to compliment them. Matter 1.4.2, the latest standard, provides a proactive layer of...

    For more secure AI and ML models: Infineon’s OPTIGA Trust M backs Thistle Technologies’ Secure...

    Infineon Technologies AG provides its OPTIGA Trust M security solution to Thistle Technologies for its new cryptographic protection for on-device AI models to its...

    PerfektBlue: Bluetooth Vulnerabilities Put Millions of Vehicles at Risk

    Researchers uncover a chain of flaws in a widely used automotive Bluetooth stack, exposing infotainment systems to remote compromise In July 2025, cybersecurity researchers disclosed...

    Establishing a Robust and Flexible Framework for Post-Quantum Security

    Given the rapid advances in quantum computing, it is urgent now to urge the application of post-quantum cryptography (PQC). Every industry must armor its...

    BLACKBOX AI: Dissecting the AI Network Traffic

    Courtesy: Keysight Technologies Blackbox AI is an AI-powered coding assistant designed to enhance developer productivity by offering features such as code generation, code search, and code...

    Microchip Enhances TrustMANAGER Platform to Support CRA Compliance and Cybersecurity Regulations

    Firmware over-the-air updates and remote cryptographic key management provide scalable solutions for addressing IoT security challenges International cybersecurity regulations continue to adapt to meet the...

    CEA-Leti and Soitec Announce Strategic Partnership to Leverage FD-SOI for Enhanced Security of Integrated Circuits

    Focus Is on Protecting Critical Markets Such as Automotive, Industrial IoT, and Secure Infrastructure CEA-Leti and Soitec announced a strategic partnership to enhance the cybersecurity...

    Infineon expands government ID portfolio with SECORA ID V2 and eID-OS for enhanced flexibility and...

    Electronic identification (eID) documents are seeing growing demand worldwide as governments push ahead with their digitalization efforts. To meet these rapidly evolving requirements more...

    Security by Design in Electronics: A Proactive Approach to Cybersecurity

    With the increasing integration of electronics in critical applications such as automotive, healthcare, industrial automation, and consumer devices, security concerns have become paramount. "Security...

    Infineon and the BSI pave the way for a quantum-resilient future: World’s first Common Criteria...

    Infineon receives world's first Common Criteria EAL6 certification for implementing a post-quantum cryptography (PQC) algorithm in a security controller Internationally accepted certification...

    Navigating the Digital Frontier: Unveiling the Distinction Between Cybersecurity and Ethical Hacking

    In the ever-expanding digital landscape, the terms "cybersecurity" and "ethical hacking" often get tossed around interchangeably. While both disciplines share a common goal –...

    Keysight Launches All-In-One Solution for Network Visibility and Security

    INDIA – Keysight Technologies, Inc. launched AppFusion, a network visibility partner program that integrates third-party security and monitoring solutions directly into its network packet...

    Related News