Security

    Businesses Collect More Data than they can Handle: Report

    45% of Indian organizations can’t analyze or categorize all the consumer data they store 48% of IT professionals in India believe their organizations...

    Two-step AI-based Machine Learning Improves Attack Detection Accuracy

    Fortinet announced the latest version of its FortiWeb Web Application Firewall (WAF) software release 6.0, making it the only major WAF security vendor to...

    Expansion of Global MSSP with New Services Enablement and Technical Support Offerings

     The global leader in broad, integrated, and automated cybersecurity solutions, Fortinet, announced an expansion of its Global Managed Security Service Provider Program (MSSP) through...

    Top 6 Security and Risk Management Trends

    Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner, Inc. said that security leaders should harness this increased support...

    Next-Generation Security-on-a-Chip for All Things Smart

    STMicroelectronics has brought together the latest digital security techniques in a single chip to protect Smart Things and Networks including those for utility infrastructure...

    How and Why Bitcoin Mining Poses Security Risks

    From 2017 to 2018, the cost of one Bitcoin increased over one thousand percent. This rapid growth dominated headlines and ignited a cryptocurrency boom that left...

    Cryptocurrency Miner Malware grows 629 percent in Q1 2018, finds a Report

    Coin miner malware grows 629% in Q1 2018 Lazarus cryptocurrency campaigns steal bitcoins from financial sector and users Gold Dragon targets Winter Games...

    Create secured IoT endpoints with the first 32-bit MCU to feature robust, chip-level security and...

    With the booming growth of the Internet of Things (IoT) endpoints, security is sometimes an afterthought for many designers, increasing the risk of exposing...

    Machine Learning Algorithms for Zero Time to DDoS Attack Mitigation

    DDoS attacks are growing in complexity and volume and represent a major threat to any organization. Service providers and enterprises require expertise and knowledge...

    The 3 Dragons of Network Monitoring

    Network performance can be a beast. But the IT team that is properly prepared, with the right tools, can prevail in even the most difficult...

    Why Hardware Encryption is More Effective Than Software Encryption For Securing The Internet of Things

    What exactly is hardware encryption? Hardware encryption is an approach to securing sensitive data by using a dedicated processor for calculating the encryption algorithms, dedicated...

    Here’s How to be Cyber-Safe during FIFA World cup 2018

    Fortinet, a global leader in broad, integrated and automated cyber security solutions, today cautioned ardent football fans in India to stay vigilant against cyber-attacks...

    NORD China hosts VDMA´s China Management Meeting at Suzhou

    NORD (China) Power Transmission Co Ltd, a subsidiary of NORD DRIVESYSTEMS - Germany, one of the world´s leading manufacturers of drive technology, recently played...

    Fortinet Acquires Bradford Networks

    Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today completed the acquisition of Bradford Networks, further enhancing the Fortinet Security Fabric...

    5 Ways Security Leaders Can Be Empowered to Drive Results

    The overwhelming demands on security leaders today can have a paralyzing effect. During the opening keynote address at the Gartner Security and Risk Management Summit,...

    Related News