Security

Displaying 1 - 10 of 131

DPI Solution enables security of cloud applications

DPI Solution enables security of cloud applications
An embedded deep packet inspection (DPI) engine from Rohde & Schwarz Cybersecurity serves as the core for Barracuda's NextGen firewall F-series. The Barracuda F-series firewall is able to classify network applications up to Layer 7 in real-time, and can granularly control what applications are permitted, prioritized or de-prioritised for access.
19th January 2018

The DDoS threat for energy and utility companies

The DDoS threat for energy and utility companies
Protecting our critical infrastructure from cyber attacks has become a top priority for governments around the world - largely as a result of the IoT. Within the energy sector, the increased connectivity brought about by IoT has improved how we manage our power distribution and consumption, enabling a more flexible and efficient energy grid. By: Scott Taylor, VP at Corero Network Security.
19th January 2018

Duo ensure the cyber security of infotainment units

Duo ensure the cyber security of infotainment units
In order to ensure the cyber security of connected automotive technologies, Argus Cyber Security and STMicroelectronics have announced a joint effort. As telematics and infotainment units become increasingly complex to support high-value connected services, they become more vulnerable to cyber attacks. Securing these units against such attacks requires sophisticated, multi-layered security, and ongoing monitoring throughout the lifetime of the vehicle.
16th January 2018


Attackers bypass login credentials in corporate laptops

Attackers bypass login credentials in corporate laptops
Thanks to the insecure defaults in Intel’s AMT, intruders are able to completely bypass user and BIOS passwords and TPM and Bitlocker PINS to backdoor almost any corporate laptop in a matter of seconds. F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds.
16th January 2018

New security event coming to Birmingham in 2019

New security event coming to Birmingham in 2019
A new exhibition has been announced by Western Business Exhibitions (WBE) for the UK’s security industry. The Security Event will be held from the 9th to 11th April 2019 at the NEC, Birmingham. The Security Event is backed by seven industry leading manufacturers and distributors as founding partners, all of whom will be exhibiting at the event including Anixter, Comelit, Dahua, TDSi, Texecom, Tyco and Videcon.
15th January 2018

Dynamic certificates make cloud service providers more secure

Dynamic certificates make cloud service providers more secure
The volume of digital data produced and stored by companies is growing. Cloud technology offers a convenient solution: IT service providers offer storage space or software which enables data to be saved remotely. But how can companies be sure that their data is protected against unauthorised access or deletion? Researchers from the Technical University of Munich (TUM) have studied this issue and developed a model which allows service providers to be checked and certified reliably.
15th January 2018

Intel AMT security issue lets hackers bypass login credentials

Intel AMT security issue lets hackers bypass login credentials
Security company F-Secure has reported a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.
12th January 2018

Security whitepaper helps developers meet GDPR requirements

Security whitepaper helps developers meet GDPR requirements
  A comprehensive whitepaper on security aspects has been produced by Rutronik. It will help developers, product managers, and buyers to create secure switching and system concepts, thereby also meeting the requirements of the GDPR (General Data Protection Regulation), which becomes legally enforceable on 25th May 2018.
10th January 2018

How to stay cyber safe this January

How to stay cyber safe this January
Learning provider Litmos Heroes is warning retailers to make sure their technology is up to date and their staff are properly trained to help them stay cyber safe during the sales. Online spending is set to hit record levels this January. An average of £1bn was spent online every week in January 2017 and with such huge figures changing hands electronically comes an increased risk of retail businesses falling victim to cyber attack and online fraud.
2nd January 2018

Secure authenticator protects device stored data

Secure authenticator protects device stored data
The DS28E38 DeepCover secure ECDSA authenticator from Maxim Integrated is in stock at Mouser Electronics. Designed to protect devices against security attacks, the DS28E38 is an Elliptic Curve Digital Signature Algorithm (ECDSA) public key-based secure authenticator. It incorporates Maxim’s patented ChipDNA physically unclonable function (PUF) technology.
22nd December 2017


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

Embedded Systems and MtoM & Objets Connectés
21st March 2018
France Paris expo Porte de Versailles
IoT Tech Expo 2018
18th April 2018
United Kingdom Olympia, London
The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham