cybersecurity

$96.3 billion Spend on CyberSecurity in 2018

Gartner, Inc. forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more...
Cyber Security

What’s Next for Cybersecurity in 2018?

Is it possible to anticipate what the coming year will bring us – pro and con – on the cyber-security front? Making precise predictions...
Maxim Integrated Turnkey Security

Maxim Integrated Showcases Turnkey Security Solutions for Protecting Embedded Systems at TRUSTECH 2017

At TRUSTECH 2017 in Cannes, France (November 28-30, 2017), Maxim Integrated Products, Inc. will demonstrate new turnkey technologies that protect embedded and connected systems...
paygilant

Paygilant Meets New RBI Guidelines and Marches India’s Wallet Security Forward

Paygilant's on-device fraud prevention solution meets the Reserve Bank of India's (RBI) most recent Prepaid Payment Instruments (PPI) guidelines. The latest RBI guidelines from October 2017 require PPI issuers to...
RAH Infotech

RAH Infotech becomes the national distributor for Rapid7 in India and Bangladesh

RAH Infotech, India’s fastest growing value-added technology distributors, announced that it has signed an agreement with Rapid7 a leading provider of analytics solutions for security...
security tips

Expert offers security tips for Cyber Monday shoppers to protect themselves from scammers

As consumers surf the internet to find the best Cyber Monday deals, Virginia Tech’s cybersecurity expert Gang Wang forewarns shoppers to be on the...
ChipDNA Technology

Defend Designs from Attack with Maxim’s Unclonable Security ICs

Designers can now easily, proactively, and inexpensively protect their intellectual property and products with a solution immune to invasive physical attacks—the DS28E38 DeepCover secure authenticator...
CryptoAuthentication device

Protect IP and deploy secured connected systems with Microchip’s new CryptoAuthentication device and Security...

From remote cyber-attacks to the creation of counterfeit products, security threats are wide-spread and affect all industries. When carried out, these threats can translate...
Internet of Things

Newly Revealed Flaw Could Subject IoT Devices to Airborne Attacks

Billions of voice-activated Internet of Things devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed on Wednesday. Hackers could exploit BlueBorne to mount...
Skybox Security

Skybox Security Introduces Threat–Centric Vulnerability Management for Virtual and Cloud Networks

Skyboxä Security, a global leader in cybersecurity management, continues to expand its cloud security management solution, Skybox for the Cloud. The solution now includes...
- Advertisement -