Security

Data Security Best Practices for Electrical and Electronics Manufacturing

Data processing has become an integral part of every business, regardless of the industry in which they operate. While the electrical and electronics manufacturing...

Tech Mahindra Announced Collaboration with Microsoft to Offer Integrated Security Solutions

Tech Mahindra, a leading provider of digital transformation, consulting, and business re-engineering services and solutions, today announced that it has collaborated with Microsoft to provide...

The Metamorphoses of Warfare with Cyber Attacks

Amidst the perpetual and turbulent innovation and adoption of tech-oriented ecosystems by the world, the looming threats are overshadowing them at a much faster...

SonicWall Threat Intelligence Confirms 981% Increase of Ransomware Attacks in India

SonicWall, the publisher of the world’s most quoted ransomware threat intelligence, today released the 2022 SonicWall Cyber Threat Report. The bi-annual report details a...

Infineon Launches World’s First TPM With a PQC-Protected Firmware Update Mechanism

Quantum computing is expected to have a significant impact on cybersecurity, specifically on the confidentiality of encrypted data and on the integrity of digital...

New Fortinet Firewall Increases Security and Networking Convergence Across Hybrid IT to Enable Secure Digital...

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today announced the FortiGate 3000F, the latest Next-Generation Firewall (NGFW) powered by Fortinet’s...

Fighting the Phish

Phishing is one of the oldest cybersecurity scams and often one of the first steps in a complex, multi-stage attack. For instance, 67% of...

Akamai Research Reveals Extensive Global Piracy Demand, Industry and Regional Trends

Akamai Technologies, Inc., the world’s most trusted solution for protecting and delivering digital experiences, released today new research detailing the persistence of online piracy....

Political Turmoil, Hyperscaler Protocols and Edge Clouds will Drive Operator Thinking in 2022

Nation states will ramp up mobile cyber-attacks; hyperscalers will mimic Google and introduce powerful proprietary encryption protocols; and new edge clouds could make the...

Integration of Video Technology Across Sectors for Efficient Management

Technological innovation has expanded the remit of what video technology can be used for and with the increased bandwidth that 5G gives connected devices,...

STM32Trust: Secure Boot, Update, Install, and More, All Under One Roof

Is it possible to transform security on embedded systems from a burden to a blessing? It’s the question ST is trying to answer with STM32Trust,...

Cloud Computing: 2022’s Most Valuable Technologies in Tech

Cloud computing is touted as one of the most promising and valuable technologies in the recent past. Cloud computing was the most reliable answer...

Avast Bolsters Privacy Provisions in Avast One Portfolio

Avast, a global leader in digital security and privacy, today announced the addition of several deep privacy features to Avast One, its recently launched...

Fortinet Announces the First Next-Generation Firewall and Secure SD-WAN Integration in Microsoft Azure Virtual WAN

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today announced the expansion of its collaboration with Microsoft to deliver the industry’s...

Cybersecurity No Longer Seen as a Cost Center, but as a Business Enabler: Trend Micro

CLOUDSEC 2021, one of the industry's biggest cybersecurity events hosted by Trend Micro Incorporated, attracted thought leaders and technology experts across sectors speaking at the...

Related News