Security

    Honeypot Cybersecurity Technique can Also Stop Attacks in Natural Language Processing

    As online fake news detectors and spam filters become more sophisticated, so do attackers' methods to trick them—including attacks through the "universal trigger." In...

    Hiding Malware Inside AI Neural Networks

    A trio of researchers at Cornell University has found that it is possible to hide malware code inside of AI neural networks. Zhi Wang,...

    Personalization vs Privacy – The Evolving Realities of Digital Marketing

    Digital has transformed the way products are marketed.  As customers move their lives to the digital world, whether to consume media, interact with friends...

    iWave Security Suite ensures Privacy and Security in the HealthCare IoT

    With the brisk of evolving technology around us, the medical and health care field has witnessed a giant leap in reaching out its consumers...

    Firewalls and their Cool Features

    The latest next-generation firewalls (NGFWs) utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, anti-malware, content filtering and...

    Scramble for Cyber Space: India Needs Urgently to Formulate its National Cyber Strategy

    Two critical aspects of cyber space were explained by the Indian National Cyber Security Coordinator Lt. Gen. (Dr) Rajesh Pant at a conference organised...

    Sonicwall Triples Threat Performance, Dramatically Improves TCO with Three New Enterprise Firewall

    SonicWall announced three new high-performance firewall models for enterprises and large organizations — NSa 4700, NSa 6700 and NSsp 13700 — designed to accelerate network throughput, stop advanced cyberattacks like ransomware, and...

    Video Game Industry Faced Highest Growth in Cyberattacks during Pandemic

    Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s most trusted solution for protecting and delivering digital experiences, today released research showing that cyberattack traffic targeting the...

    Next-Generation Firewalls: What to Expect of it and How to Select the best Solution

    In a rapidly changing IT landscape — one characterized by companies rushing headlong into the cloud, network traffic per cent increases in the double...

    Extended Platform for IoT Linux Devices

    Toradex is extending its Torizon operating system for use as a full IoT development and operations (DevOps) platform for Linux devices. The operating system...

    Deepening your Network Security

    Today’s business-driven IT initiatives — such as mobility, BYOD, wireless, cloud and IoT — inadvertently create new vectors for cyberattack. Organizations often do not...

    The Role of Hardware Security to Meet Industry 4.0 Aspirations

    Industry 4.0 Aspirations and the Cyber Security Implication Industry 4.0, which involves the digitization of factories, can mean many different things to organizational leaders in...

    Microchip Further Protects FPGA-based Designs with First Tool that Combats Major Industry Threat to...

    Builds on its FPGA family’s best-in-class security to block the theft of data,intellectual property and other private information from deployed systems Mission-critical and other high-assurance...

    Team Builds First Hacker-Resistant Cloud Software System

    Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses...

    India to be Top Spender on Security Solutions in APAC in 2021: IDC

    Driven by increased cloud adoption and massive work-from-home migration, Australia and India will account for 26 per cent of the overall security spending in the...

    Related News