Security Archives » Page 25 of 30 » Electronicsmedia

Security

Cybersecurity-Platform

Juniper Networks Simplifies Threat Response with Enhancements to its Unified Cybersecurity Platform

Juniper Networks, an industry leader in automated, scalable and secure networks, announced new enhancements to its unified cybersecurity platform, empowering customers to run their...
cybersecurity

How to Protect Online Business from Hackers

If you are running an online business, your digital properties including your websites, mobile apps, social handles, and emails are the backbone of your...
Supply_Chain_Security

SECURING THE DIGITAL SUPPLY CHAIN

Ensuring a secure supply chain is a necessary precondition in today’s world of commerce. The digital supply chain has emerged as the weakest link...
Report on Hyper-Converged Infrastructure

IT Leaders Wrestling Hyper-Converged Infrastructure (HCI) Security, yet 65% Say It Can Transform ‘Flexibility’:...

 New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about Hyper-Converged Infrastructure (HCI) has revealed flexibility (65%) performance...
Nikhil Taneja || Managing Director-India, SAARC & Middle East || Radware

Are you prepared for a Memcached Under Attack

In February of 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never...
IoT_SoC_Security

For Secure IoT SoCs Synopsys adds Algorithms in DesignWare Security Protocol Accelerators

DesignWare Security Protocol Accelerators offer a complete range of standards-compliant symmetric and hash cryptographic algorithms to protect SoCs from IoT attacks Supports up to 6.8...
Cloud-Malware-Security

Radware Neutralizes Evasive Zero-Day Malware Threats with Cloud Malware Protection Service

Radware, a leading provider of cybersecurity and application delivery solutions and services, today launched its Cloud Malware Protection Service, built to detect, alert and...
Data_Security_Connected_Vehicle

Vehicle communication: Infineon and Elektrobit improve data security in the car

New features in the car require electronic control units that are networked, with each other and the cloud. Embedded IT security is a vital...
Meltdown_Spectre

7 Steps to tackle with Spectre & Meltdown: New Class of Vulnerabilities

"Spectre" and "Meltdown" are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation...
Biometric Authentication Software

Biometric Authentication Software “AuthConductor Client”  for PCs Launched by Fujitsu

Fujitsu today announced the launch of Fujitsu Security Solution AuthConductor Client, a suite of biometric authentication software for PCs. The product is intended for...

Interview