Security

BD Soft Ties up with Data Resolve, Strengthens Its Offerings in Cyber Security & Enterprise...

BD Soft, one of the largest distributors of security solutions, recently added another feather in its cap of strong business partners. The company recently...

Honeypot Cybersecurity Technique can Also Stop Attacks in Natural Language Processing

As online fake news detectors and spam filters become more sophisticated, so do attackers' methods to trick them—including attacks through the "universal trigger." In...

Hiding Malware Inside AI Neural Networks

A trio of researchers at Cornell University has found that it is possible to hide malware code inside of AI neural networks. Zhi Wang,...

Personalization vs Privacy – The Evolving Realities of Digital Marketing

Digital has transformed the way products are marketed.  As customers move their lives to the digital world, whether to consume media, interact with friends...

iWave Security Suite ensures Privacy and Security in the HealthCare IoT

With the brisk of evolving technology around us, the medical and health care field has witnessed a giant leap in reaching out its consumers...

Firewalls and their Cool Features

The latest next-generation firewalls (NGFWs) utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, anti-malware, content filtering and...

Scramble for Cyber Space: India Needs Urgently to Formulate its National Cyber Strategy

Two critical aspects of cyber space were explained by the Indian National Cyber Security Coordinator Lt. Gen. (Dr) Rajesh Pant at a conference organised...

Sonicwall Triples Threat Performance, Dramatically Improves TCO with Three New Enterprise Firewall

SonicWall announced three new high-performance firewall models for enterprises and large organizations — NSa 4700, NSa 6700 and NSsp 13700 — designed to accelerate network throughput, stop advanced cyberattacks like ransomware, and...

Video Game Industry Faced Highest Growth in Cyberattacks during Pandemic

Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s most trusted solution for protecting and delivering digital experiences, today released research showing that cyberattack traffic targeting the...

Next-Generation Firewalls: What to Expect of it and How to Select the best Solution

In a rapidly changing IT landscape — one characterized by companies rushing headlong into the cloud, network traffic per cent increases in the double...

Extended Platform for IoT Linux Devices

Toradex is extending its Torizon operating system for use as a full IoT development and operations (DevOps) platform for Linux devices. The operating system...

Deepening your Network Security

Today’s business-driven IT initiatives — such as mobility, BYOD, wireless, cloud and IoT — inadvertently create new vectors for cyberattack. Organizations often do not...

The Role of Hardware Security to Meet Industry 4.0 Aspirations

Industry 4.0 Aspirations and the Cyber Security Implication Industry 4.0, which involves the digitization of factories, can mean many different things to organizational leaders in...

Microchip Further Protects FPGA-based Designs with First Tool that Combats Major Industry Threat to...

Builds on its FPGA family’s best-in-class security to block the theft of data,intellectual property and other private information from deployed systems Mission-critical and other high-assurance...

Team Builds First Hacker-Resistant Cloud Software System

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses...

Related News