Security

    iWave Security Suite ensures Privacy and Security in the HealthCare IoT

    With the brisk of evolving technology around us, the medical and health care field has witnessed a giant leap in reaching out its consumers...

    Firewalls and their Cool Features

    The latest next-generation firewalls (NGFWs) utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, anti-malware, content filtering and...

    Scramble for Cyber Space: India Needs Urgently to Formulate its National Cyber Strategy

    Two critical aspects of cyber space were explained by the Indian National Cyber Security Coordinator Lt. Gen. (Dr) Rajesh Pant at a conference organised...

    Sonicwall Triples Threat Performance, Dramatically Improves TCO with Three New Enterprise Firewall

    SonicWall announced three new high-performance firewall models for enterprises and large organizations — NSa 4700, NSa 6700 and NSsp 13700 — designed to accelerate network throughput, stop advanced cyberattacks like ransomware, and...

    Video Game Industry Faced Highest Growth in Cyberattacks during Pandemic

    Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s most trusted solution for protecting and delivering digital experiences, today released research showing that cyberattack traffic targeting the...

    Next-Generation Firewalls: What to Expect of it and How to Select the best Solution

    In a rapidly changing IT landscape — one characterized by companies rushing headlong into the cloud, network traffic per cent increases in the double...

    Extended Platform for IoT Linux Devices

    Toradex is extending its Torizon operating system for use as a full IoT development and operations (DevOps) platform for Linux devices. The operating system...

    Deepening your Network Security

    Today’s business-driven IT initiatives — such as mobility, BYOD, wireless, cloud and IoT — inadvertently create new vectors for cyberattack. Organizations often do not...

    The Role of Hardware Security to Meet Industry 4.0 Aspirations

    Industry 4.0 Aspirations and the Cyber Security Implication Industry 4.0, which involves the digitization of factories, can mean many different things to organizational leaders in...

    Microchip Further Protects FPGA-based Designs with First Tool that Combats Major Industry Threat to...

    Builds on its FPGA family’s best-in-class security to block the theft of data,intellectual property and other private information from deployed systems Mission-critical and other high-assurance...

    Team Builds First Hacker-Resistant Cloud Software System

    Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses...

    India to be Top Spender on Security Solutions in APAC in 2021: IDC

    Driven by increased cloud adoption and massive work-from-home migration, Australia and India will account for 26 per cent of the overall security spending in the...

    Security Researcher Manages to Jailbreak the Apple AirTag

    After Apple's recent release of the AirTag for locating misplaced items, security researchers have just succeeded in jailbreaking the new tagging device. The German...

    Category Killers of the Internet are Significantly Reducing Online Diversity

    The number of distinctive sources and voices on the internet is proven to be in long-term decline, according to new research. A paper entitled "Evolution...

    How to Keep Automated Electric Vehicles Safe

    As they move toward automated electric cars accelerates, protecting the cybersecurity of these vehicles has become urgent. That's why University of Georgia researchers are...

    Related News