Juniper Networks Simplifies Threat Response with Enhancements to its Unified Cybersecurity Platform
Juniper Networks, an industry leader in automated, scalable and secure networks, announced new enhancements to its unified cybersecurity platform, empowering customers to run their...
How to Protect Online Business from Hackers
If you are running an online business, your digital properties including your websites, mobile apps, social handles, and emails are the backbone of your...
SECURING THE DIGITAL SUPPLY CHAIN
Ensuring a secure supply chain is a necessary precondition in today’s world of commerce. The digital supply chain has emerged as the weakest link...
IT Leaders Wrestling Hyper-Converged Infrastructure (HCI) Security, yet 65% Say It Can Transform ‘Flexibility’:...
New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about Hyper-Converged Infrastructure (HCI) has revealed flexibility (65%) performance...
Are you prepared for a Memcached Under Attack
In February of 2018 several organizations began publicly disclosing a trend in UDP amplified attacks utilizing exposed Memcached servers. The Memcached protocol was never...
For Secure IoT SoCs Synopsys adds Algorithms in DesignWare Security Protocol Accelerators
DesignWare Security Protocol Accelerators offer a complete range of standards-compliant symmetric and hash cryptographic algorithms to protect SoCs from IoT attacks
Supports up to 6.8...
Radware Neutralizes Evasive Zero-Day Malware Threats with Cloud Malware Protection Service
Radware, a leading provider of cybersecurity and application delivery solutions and services, today launched its Cloud Malware Protection Service, built to detect, alert and...
Vehicle communication: Infineon and Elektrobit improve data security in the car
New features in the car require electronic control units that are networked, with each other and the cloud. Embedded IT security is a vital...
7 Steps to tackle with Spectre & Meltdown: New Class of Vulnerabilities
"Spectre" and "Meltdown" are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation...
Biometric Authentication Software “AuthConductor Client” for PCs Launched by Fujitsu
Fujitsu today announced the launch of Fujitsu Security Solution AuthConductor Client, a suite of biometric authentication software for PCs. The product is intended for...

















