World’s first Smart Mobile Device Vendor to obtain Privacy Protection Certification
On April 8, 2020, Huawei released P40 series in its spring online launch event, in which Richard Yu, CEO of Huawei's Consumer...
Home Security Technologies Every Homeowner Needs
Facial Recognition Doorbells
Facial recognition doorbells are a perfect example of technology and security integration. These doorbells can recognise...
Netskope announced Zero Trust Network Access (ZTNA) Next
Netskope announced ZTNA Next, the evolution of its award-winning Zero Trust Network Access (ZTNA) solution. Unlike most ZTNA solutions purporting full replacement...
Wearin developed high-tech connected vest with environmental and biometric sensors
Since the beginning of October, all the agents at the security company SOS Cash & Value have been equipped with the intelligent...
RZ/G Linux Platform Solution to Protect Industrial Control Systems from Cyberattacks.
Renesas Electronics announced plans to release a security solution based on the Renesas RZ/G Linux Platform that will reduce the amount of time required...
Top 6 Nord Security highlights of 2021
Find out about the company’s biggest moments of this year
As 2021 is coming to an end, we at...
Matrix Security Solutions selected by La Maison Royale for Motion & Intrusion Detection
La Maison Royale Nairobi is a 4-star superior boutique business hotel with a “French taste”, State-of-the-art facility and close to the entertainment...
Contactless payments: secure technology or back door for fraud?
Everything you need to know before you decide to make the switch to chip readers and smartphone-based payment systems-Over the past several years, contactless...
VPNFilter Malware: What is known so far
A new destructive VPNFilter malware has compromised 500, 000 networking devices worldwide
Recently, a malware known as “VPNFilter” was discovered infecting various types of routers....
Next-Generation Hardware-Based Cybersecurity Products
UltraSoC announced next-generation hardware-based cybersecurity products that can be used to detect, block and record cyber-attacks in a broad range of applications –...