Social media emerging as the most valuable target zones for cyber attackers
Next time you post details about your workplace and job description on social media websites, be careful you could emerge as the potential target...
Analog Devices’ Wireless Battery Management System certified for Top Automotive Cybersecurity Qualification
Analog Devices Wireless Battery Management System (wBMS) is certified to the highest standard of automotive cybersecurity engineering and management. ISO/SAE 21434 is the new...
Rohde & Schwarz Cybersecurity’s R&SPACE 2 DPI Software Features New Classification for Stratum Mining...
Rohde & Schwarz Cybersecurity, a leading IT security company, has enhanced its R&SPACE 2 deep packet inspection (DPI) software to include Stratum protocol classification...
WinMagic and LogicDS Team up to Simplify and Secure Operating System Lifecycle Management
WinMagic, an award-winning encryption and intelligent key management security solution provider, and LogicDS, which offers SWIMAGE, the only true, commercial off the shelf end-to-end automated...
NordVPN Creators Launch NordStellar: Business Threat Management Platform
NordStellar allows companies to cut down on data leak detection times and minimize risk to an organizationFor several years, the platform was...
Matrix COSEC VEGA FAX, an advanced door controller security solution
Matrix introduced COSEC VEGA FAX, an advanced door controller which has a 3.5’’ TFT display with a capacitive touchscreen interface to put...
The Technology Crutch: How Will Innovative Technology Improve Our Cybersecurity Defenses?
One consistent theme throughout Cybertech Fairfax 2017, which took place on Tuesday, June 13, was the critical need for innovative technology that safeguards against...
Expanding Global Managed Security Service for Comprehensive Defense against Diversifying Cyberattacks: Fujitsu
Fujitsu announced that it is expanding its Fujitsu Security Solution Global Managed Security Service, which provides centralized lifecycle support, from cyberattack prediction to system...
The biggest and worst data breaches of 2019
Last year, hackers didn't just hack — they also collected billion-account databases from breaches and leaks that had occurred years ago, only...
New business challenges drive the need for next-gen EDRM solutions
There is a growing need for ensuring data protection across applications, devices, and users. As information sharing becomes increasingly prevalent, the state of data...