Cyber Security
The four most common OWASP API security threats
The Open Web Application Security Project (OWASP) works to improve the security of software worldwide. OWASP’s well-known Top 10 lists increase awareness about the most critical security risks to web applications. Stephanie Best, Head of Product Marketing at Salt Security further discusses.
PureVPN partnership for enhanced user digital privacy and security
Internet privacy and security brand, PureVPN, has announced a partnership with Samsung Electronics to enhance user privacy protection when online.
AI-enabled cybersecurity for public and private sectors
NVIDIA and Booz Allen Hamilton have announced an expanded collaboration to bring an AI-enabled, GPU-accelerated cybersecurity platform to customers in the public and private sectors.
Swissbit introduces Hardware Security Module for AWS IoT Greengrass
Swissbit is once again exhibiting at Europe's IT security trade fair to present its latest solutions for data and device protection.
Delta Logic releases version 1.1
Version 1.1, the powerful software ACCON-OPC-Server UA of the Swabian specialist for industrial communication now supports SINUMERIK controllers for machine tools.
Functional safety, cybersecurity protection and AUTOSAR compatibility
To provide manufacturers with an MCU solution equipped with components that meet ISO 26262 functional safety and ISO/SAE 21434 cybersecurity engineering standards, Microchip Technology announces the PIC32CM JH microcontroller (MCU).
Children could turn to cybercrime during cost-of-living crisis
40% of parents believe children will become the perpetrators of cybercrime because of a lack of money, during the current cost-of-living crisis.
GlobalPlatform calls for global alignment on cybersecurity levels
GlobalPlatform, the standard for secure digital services and devices, has released a whitepaper highlighting the potentially confusing implementation of security levels in the EU Cybersecurity Certification Scheme (EUCC) proposed by the European Union Agency for Cybersecurity (ENISA) as part of the Cyber Security Act (CSA).
The looming Cloud threat – securing the modern Cloud infrastructure
When we are looking at public Cloud servers, we are talking about three main companies: Amazon, Microsoft, and Google. These powerhouses control upwards of 80% of the market. On these public cloud servers, information is collected, pooled, and accessed on demand by those who need it. When an end-user surfs the Internet – be it to stream their favourite show, make a purchase or answer emails – these requests and associated data are bei...
Fighting cyber attackers earlier to reduce risk
We face an exciting evolution in the cybersecurity sector, says Chris Roberts, Fortinet.