Security

Cryptocurrency Miner Malware grows 629 percent in Q1 2018, finds a Report

Coin miner malware grows 629% in Q1 2018 Lazarus cryptocurrency campaigns steal bitcoins from financial sector and users Gold Dragon targets Winter Games...

Create secured IoT endpoints with the first 32-bit MCU to feature robust, chip-level security and...

With the booming growth of the Internet of Things (IoT) endpoints, security is sometimes an afterthought for many designers, increasing the risk of exposing...

Machine Learning Algorithms for Zero Time to DDoS Attack Mitigation

DDoS attacks are growing in complexity and volume and represent a major threat to any organization. Service providers and enterprises require expertise and knowledge...

The 3 Dragons of Network Monitoring

Network performance can be a beast. But the IT team that is properly prepared, with the right tools, can prevail in even the most difficult...

Why Hardware Encryption is More Effective Than Software Encryption For Securing The Internet of Things

What exactly is hardware encryption? Hardware encryption is an approach to securing sensitive data by using a dedicated processor for calculating the encryption algorithms, dedicated...

Here’s How to be Cyber-Safe during FIFA World cup 2018

Fortinet, a global leader in broad, integrated and automated cyber security solutions, today cautioned ardent football fans in India to stay vigilant against cyber-attacks...

NORD China hosts VDMA´s China Management Meeting at Suzhou

NORD (China) Power Transmission Co Ltd, a subsidiary of NORD DRIVESYSTEMS - Germany, one of the world´s leading manufacturers of drive technology, recently played...

Fortinet Acquires Bradford Networks

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today completed the acquisition of Bradford Networks, further enhancing the Fortinet Security Fabric...

5 Ways Security Leaders Can Be Empowered to Drive Results

The overwhelming demands on security leaders today can have a paralyzing effect. During the opening keynote address at the Gartner Security and Risk Management Summit,...

High Performance NuMicro M480 Series Arm Cortex-M4 Microcontroller with Secure Boot Function and Hardware Cryptography

Nuvoton Technology Corp., a leading microcontroller provider, announces the launch of its high performance, low power NuMicroM480 series - an ArmCortex-M4 based microcontroller, supporting...

Commvault and Alibaba Cloud Join Forces to Accelerate Worldwide Digital Transformations

Commvault and Alibaba Cloud jointly announced to leverage each other’s technology and market advantages to deliver advanced, innovative and scalable hybrid cloud data management...

Virtualised Network Encryption Platform to help Customers Address Evolving Data Security Needs

Gemalto, the world leader in digital security, today announced the launch of a new virtualized network encryption platform, SafeNet Virtual Encryptor CV1000 as part of its continued...

Fortinet’s PartnerSYNC equips partners to take advantage of Digital Transformation to unlock new business opportunities

Fortinet conducted its annual SAARC PartnerSYNC conference in Bangkok, Thailand and honoured partners for their outstanding achievements in 2017. The conference hosted over 150...

5 Must-Have DDoS Protection Technologies

Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS attacks are not just...

eWON Cosy supports Alarm Notifications

HMS Industrial Networks announces that their award-winning Industrial Remote Access router, eWON Cosy, now supports e-mail and SMS notifications. This means that once an...

Related News