Security

Displaying 141 - 150 of 191

How to thwart POS hackers

How to thwart POS hackers
In the present climate it is unusual that a day goes by without a cyber security story hitting the headlines. Data hacking, digital terrorism and cyber security breaches have become commonplace in our ever-more connected world. 
24th July 2017

Doubling down on security

Doubling down on security
The general availability milestone for the latest release of the Wind River Titanium Cloud product family has been achieved. Guest blog by Ron Breault.
19th July 2017

App protects your digital legacy after you pass away

App protects your digital legacy after you pass away
The password manager and secure digital vault, Keeper Security, has announced its new Emergency Access feature which will allow up to five trusted family members or friends entrance into a customer’s secure digital vault to access important files, passwords and documents in the case of an emergency or tragic event. Emergency Access can be set up to protect Keeper customers’ digital legacies in the event they become incapacitated, disabled or pass away.
18th July 2017


Network appliance for network security and virtualisation

Network appliance for network security and virtualisation
The Lanner NCA-6210, a 2U x86 rackmount network appliance built with the Intel Xeon Scalable processor platform and C621/C627 chipset, features powerful networking processing capability, higher throughput for virtualisation applications, up to 640GB DDR4 2666MHz REG DIMM and the support for 1.5x memory bandwidth as previous generation Intel Xeon processor based server platforms.
14th July 2017

SIM products enable secure connection of IoT devices

SIM products enable secure connection of IoT devices
Two solutions to connect billions of Internet of Things (IoT) devices have been launched by G+D Mobile Security; 'IoT Attach' and 'IoT Advance'. The 'IoT Attach' and 'IoT Advance' Subscriber Identity Module (SIM) products have been developed in cooperation with reference Mobile Network Operators (MNOs) and IoT application providers. These dedicated SIM products not only offer the benefit of network protection to MNOs, but also protect IoT data and help tackle the big concern of lifecycle management of IoT devices.
12th July 2017

Duo provide safe, trusted, and easy-to-use IoT devices

Duo provide safe, trusted, and easy-to-use IoT devices
  STMicroelectronics and Security Platform, a Korea-based technology innovator enabling trusted connectivity for the Internet of Things (IoT), are bringing robust, efficient, and easy-to-use security solutions to IoT devices. The IoT comprises potentially billions of tiny, connected, embedded computing devices to help manage services and infrastructure automatically.
12th July 2017

Belden introduces 'Industrial Cyber Security for Dummies'

Belden introduces 'Industrial Cyber Security for Dummies'
Belden, a global leader in signal transmission solutions for mission-critical applications, has published a special edition of Industrial Cyber Security for Dummies. The book, which was written by David Meltzer and Jeff Lund, is a Belden/Tripwire Special Edition. It can be downloaded free of charge in .pdf format – and is also available in a regular print edition.
11th July 2017

Are you at risk of being hacked without even knowing it?

Are you at risk of being hacked without even knowing it?
Research from consumer security firm BullGuard has shown that, with an ever-increasing amount of connected devices in our everyday lives from fitness trackers, smart TVs and even children's toys, millions of people are seriously at risk of being hacked. 
11th July 2017

TÜV SÜD appointed Certified Body for Cyber Essentials programme

TÜV SÜD appointed Certified Body for Cyber Essentials programme
It has been revealed that TÜV SÜD United Kingdom has achieved Certified Body status for the UK Government’s Cyber Essentials programme, which is designed to protect organisations from cyber security threats. Organisations certified by TÜV SÜD can promote that their IT systems comply with a Government-endorsed standard, demonstrating that they are protecting their own and their customers’ data by having a robust and secure IT environment.
11th July 2017

Industrial control needs greater cyber security

Industrial control needs greater cyber security
The need to improve cyber security in industrial control systems is at the forefront of a report published by accreditation body CREST, claiming that a lack of standards-based technical security testing is putting industrial control environments and critical national infrastructure at risk.
11th July 2017


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

Developing secure and scalable IoT solutions
21st June 2018
United Kingdom Cocoon Networks, London
The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham