Security Archives » Page 19 of 24 » Electronicsmedia

Security

Report on Hyper-Converged Infrastructure

IT Leaders Wrestling Hyper-Converged Infrastructure (HCI) Security, yet 65% Say It Can Transform ‘Flexibility’:...

 New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about Hyper-Converged Infrastructure (HCI) has revealed flexibility (65%) performance...
Nikhil Taneja || Managing Director-India, SAARC & Middle East || Radware

Are you prepared for a Memcached Under Attack

In February of 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never...
IoT_SoC_Security

For Secure IoT SoCs Synopsys adds Algorithms in DesignWare Security Protocol Accelerators

DesignWare Security Protocol Accelerators offer a complete range of standards-compliant symmetric and hash cryptographic algorithms to protect SoCs from IoT attacks Supports up to 6.8...
Cloud-Malware-Security

Radware Neutralizes Evasive Zero-Day Malware Threats with Cloud Malware Protection Service

Radware, a leading provider of cybersecurity and application delivery solutions and services, today launched its Cloud Malware Protection Service, built to detect, alert and...
Data_Security_Connected_Vehicle

Vehicle communication: Infineon and Elektrobit improve data security in the car

New features in the car require electronic control units that are networked, with each other and the cloud. Embedded IT security is a vital...
Meltdown_Spectre

7 Steps to tackle with Spectre & Meltdown: New Class of Vulnerabilities

"Spectre" and "Meltdown" are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation...
Biometric Authentication Software

Biometric Authentication Software “AuthConductor Client”  for PCs Launched by Fujitsu

Fujitsu today announced the launch of Fujitsu Security Solution AuthConductor Client, a suite of biometric authentication software for PCs. The product is intended for...

Stop Malicious Attacks on Your Designs with PUF Technology

Large-scale attacks often start small. Such was the case with the Mirai malware attack in 2016—hacked video surveillance cameras and other network-connected consumer devices...
Cloud_Security

Is Your Organization Ready For THESE SECURITY THREATS ON CLOUD?

The concepts of shared technology and multi-tenancy of a cloud environment come with an inescapable hazard: one single vulnerability or misconfiguration in a hypervisor...
cybersecurity

DATA FELON’S NEXT TARGET: INSURANCE FIRMS

Consumers’ trust in the financial sector throughout the years has always been high. This trust seeps into the insurance sector as well, partly owing...

Interview