Security Archives » Page 24 of 28 » Electronicsmedia

Security

Meltdown_Spectre

7 Steps to tackle with Spectre & Meltdown: New Class of Vulnerabilities

"Spectre" and "Meltdown" are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation...
Biometric Authentication Software

Biometric Authentication Software “AuthConductor Client”  for PCs Launched by Fujitsu

Fujitsu today announced the launch of Fujitsu Security Solution AuthConductor Client, a suite of biometric authentication software for PCs. The product is intended for...

Stop Malicious Attacks on Your Designs with PUF Technology

Large-scale attacks often start small. Such was the case with the Mirai malware attack in 2016—hacked video surveillance cameras and other network-connected consumer devices...
Cloud_Security

Is Your Organization Ready For THESE SECURITY THREATS ON CLOUD?

The concepts of shared technology and multi-tenancy of a cloud environment come with an inescapable hazard: one single vulnerability or misconfiguration in a hypervisor...
cybersecurity

DATA FELON’S NEXT TARGET: INSURANCE FIRMS

Consumers’ trust in the financial sector throughout the years has always been high. This trust seeps into the insurance sector as well, partly owing...
Security_Biometric

Millennials Prioritize Security over convenience, at ease with Biometric & Multifactor Authentication

IBM Security released a global study examining consumer perspectives around digital identity and authentication, which found that people now prioritize security over convenience when logging...
Winmagic

WinMagic launches SecureDoc Cloud VM Version 8.1

WinMagic, an award-winning encryption and intelligent key management security solution provider, today announced the launch of its latest software release for Cloud, SecureDoc 8.1.  This...
Fujitsu

Fujitsu Begins Large-Scale Internal Deployment of Palm Vein Authentication to Accelerate Workstyle Transformation

Fujitsu today announced that this year it will steadily roll out a large-scale deployment of its palm vein authentication technology within the company. The password-based...
Synopsys logo

Two-year study explores the roles of information security leaders and how they are affected...

 Synopsys, Inc.  today published the inaugural CISO Report, the result of a two-year data-driven study exploring the roles of information security leaders and the organizational...
Synopsys logo

Five-member board of experienced security executives to guide technical innovations of Synopsys security products...

Synopsys, Inc. (Nasdaq: SNPS) today announced the formation of a Technical Advisory Board (TAB) to guide the technical direction of the Synopsys Software Integrity Group's security products and...

Interview