IT Leaders Wrestling Hyper-Converged Infrastructure (HCI) Security, yet 65% Say It Can Transform ‘Flexibility’:...
New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about Hyper-Converged Infrastructure (HCI) has revealed flexibility (65%) performance...
Are you prepared for a Memcached Under Attack
In February of 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never...
For Secure IoT SoCs Synopsys adds Algorithms in DesignWare Security Protocol Accelerators
DesignWare Security Protocol Accelerators offer a complete range of standards-compliant symmetric and hash cryptographic algorithms to protect SoCs from IoT attacks
Supports up to 6.8...
Radware Neutralizes Evasive Zero-Day Malware Threats with Cloud Malware Protection Service
Radware, a leading provider of cybersecurity and application delivery solutions and services, today launched its Cloud Malware Protection Service, built to detect, alert and...
Vehicle communication: Infineon and Elektrobit improve data security in the car
New features in the car require electronic control units that are networked, with each other and the cloud. Embedded IT security is a vital...
7 Steps to tackle with Spectre & Meltdown: New Class of Vulnerabilities
"Spectre" and "Meltdown" are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation...
Biometric Authentication Software “AuthConductor Client” for PCs Launched by Fujitsu
Fujitsu today announced the launch of Fujitsu Security Solution AuthConductor Client, a suite of biometric authentication software for PCs. The product is intended for...
Stop Malicious Attacks on Your Designs with PUF Technology
Large-scale attacks often start small. Such was the case with the Mirai malware attack in 2016—hacked video surveillance cameras and other network-connected consumer devices...
Is Your Organization Ready For THESE SECURITY THREATS ON CLOUD?
The concepts of shared technology and multi-tenancy of a cloud environment come with an inescapable hazard: one single vulnerability or misconfiguration in a hypervisor...
DATA FELON’S NEXT TARGET: INSURANCE FIRMS
Consumers’ trust in the financial sector throughout the years has always been high. This trust seeps into the insurance sector as well, partly owing...