Security

Displaying 1 - 10 of 217

Audit keeps pace with Bluetooth attack vectors

In mid-July, the Bluetooth Special Interest Group (BSIG) published instructions for eliminating security vulnerabilities in the “Secure Simple Pairing” and “LE Secure Connections” processes. Rutronik now offers a manufacturer-independent overview at https://rutronik-tec.com/bluetoothsecurity-vulnerability-status/, which shows the patch status of the individual chip and module manufacturers.
10th August 2018

Company achieves full ISO 27001 certification

Company achieves full ISO 27001 certification
It has been announced that Cognidox, a leading provider of document management solutions for the high tech industry, has achieved ISO 27001 information security management certification. ISO 27001 certification is one of the most widely recognised and internationally accepted information security standards. 
2nd August 2018

Spam is still the number one choice for online criminals

Spam is still the number one choice for online criminals
  Online criminals have gotten savvier but they’re still relying on the same old tricks they’ve been using for decades. F-Secure research shows spam remains the most common method of spreading malicious URLs, scams and malware more than 40 years after the first email spam was sent.
1st August 2018


Collaboration aims to deliver cloud-hosted identity governance

Collaboration aims to deliver cloud-hosted identity governance
SailPoint has recently announced a strategic agreement with Rackspace, which will provide multi-cloud services across applications, data, security and infrastructure. The agreement enables organisations to host their identity governance programs in the cloud while leveraging Rackspace’s cloud expertise in helping guide businesses through each phase of their cloud transformation journey.
1st August 2018

Five cyber security tips to protect your business and website

Five cyber security tips to protect your business and website
The Gartner information technology (IT) consultancy firm forecasts that businesses will increase cyber security spending to more than $96bn to protect their proprietary data. The funding is critical as known threats, such as ransomware, give way to new and exotic intrusion programming. This kind of exploit faded rapidly from 70% of all malware payloads to only 5%, only to be replaced by newer exploitation methods.
31st July 2018

Who is responsible for securing the IoT?

Who is responsible for securing the IoT?
We all love progress, especially when it comes to our gadgets. Everything from thermostats to grilling equipment is now potentially connected, opening a broad range of functions and opportunities for convenience and pleasure. 
27th July 2018

Hacking tools for the cost of a cappuccino!

Hacking tools for the cost of a cappuccino!
Wannabe hackers looking to dip their toes into online fraud can get their hands on tools to start hacking for around the price of a cup of takeaway coffee, according to the latest Dark Web Market Price Index by Virtual Private Network (VPN) comparison service Top10VPN.com.
26th July 2018

Comment: Facebook's departing security chief calls for privacy reforms

Comment: Facebook's departing security chief calls for privacy reforms
Facebook's departing head of security, Alex Stamos, wrote a memo amidst the Cambridge Analytica scandal, calling for Facebook to collect less user data, and re-evaluate the site’s approach to privacy. This memo was published yesterday by BuzzFeed News, here.
26th July 2018

The economics of smart security cameras

The economics of smart security cameras
We’ve all experienced it: that house or commercial alarm sounding at full volume, causing a nuisance yet nobody taking it seriously because it’s become a common occurrence. One of the biggest challenges for deployment of surveillance/security cameras is the number of false alarms. By Simon Forrest, Director of Connectivity and Connected Home, Imagination Technologies.
24th July 2018

Healthcare data now more valuable than financial information

Healthcare data now more valuable than financial information
The healthcare data breach outlines a new reality. In today’s world, we are beginning to see a new and scary fact, healthcare data has grown its value so much that hackers are now willing to go the extra mile to obtain it.  Author: Olli Jarva, Managing Consultant at Synopsys' Software Integrity Group
23rd July 2018


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

IoT Solutions World Congress 2018
16th October 2018
Spain Barcelona
The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham