Security

Displaying 11 - 20 of 194

C-level executives are the weakest cyber security link

C-level executives are the weakest cyber security link
Research from by the cyber resiliency expert Mimecast has revealed that around 40% of IT decision makers say that the C-level executives are the weakest link in their organisations’ cyber security operation.
5th June 2018

Powerful IT security for the car of the future

Powerful IT security for the car of the future
  Protecting cars against cyber attacks is becoming increasingly important as more and more electronics are used to steer, accelerate and brake cars. That is why 15 partners from industry and academia will work together over the next three years on new approaches to IT security in self-driving cars.
30th May 2018

Partnership to create solutions for secure digital identification

Partnership to create solutions for secure digital identification
  G+D Mobile Security and IDnow had entered into a partnership to combine expertise and resources with the aim to develop AI-driven biometric and security technologies. A first result of this cooperation is the development of a fully automatic remote identification solution for international markets.
25th May 2018


Network design guide helps companies realise the promise of IIoT

Network design guide helps companies realise the promise of IIoT
  Whether it involves an operator checking quality on an iPad or executives comparing multisite production, mobile and cloud connectivity are the new normal in industrial operations. However, cyber attacks can take advantage of these new connections to steal product recipes or take control of a site.
25th May 2018

Anti-theft sticker protects your valuables without revealing their location

Anti-theft sticker protects your valuables without revealing their location
VTT Technical Research Centre of Finland and Streamr have developed a prototype adhesive ID tag based on blockchain technology, which enables valuable goods to be protected without revealing their location. Possible applications include electronics, jewellery and caviar. The tag developed by Streamr and VTT is based on a smart contract, using blockchain technology, between the owner of the goods and the transport company.
24th May 2018

Skills shortages still pose a major risk to security capability

Skills shortages still pose a major risk to security capability
The latest survey from the not-for-profit industry body, the Institute of Information Security Professionals (IISP), has shown that over the last three years, those feeling that organisations are getting worse at defending against major cyber security breaches has leapt from 9% to 18%. In contrast, the number of businesses that feel better prepared to respond to and deal with incidents rose from 47% to 66% over the same period. 
23rd May 2018

Children are putting their data at risk on social media

Children are putting their data at risk on social media
Social media platforms are coming under increased scrutiny, when it comes to putting safeguards in place to protect children who use social media sites. However, research conducted by Censuswide on behalf of Equifax, the consumer data information expert, reveals that 30% of children aged between 8 and 16 years old use chat rooms and online forums, raising concerns about who they are talking to and the type of information they are sharing.
22nd May 2018

Supporting cypherbridge secure boot

Express Logic has announced the integration of the Cypherbridge Systems uLoadXL secure boot and safe software update solution with its X-Ware IoT Platform. The X-Ware uLoadXL secure boot and secure firmware update solution anchors the product root of trust, authenticating and integrity checking the X-Ware-based system application. Managed software updates are securely distributed and installed on the target product.
17th May 2018

Secure remote access solution for easy connection to IoT devices

Secure remote access solution for easy connection to IoT devices
  To better serve the needs of OEMs and machine builders, Moxa has launched a new Remote Connect Suite that provides an easier and more secure way to connect to remote machines and equipment for the performance of critical troubleshooting, maintenance, data acquisition, and device management, resulting in faster and smarter support.
15th May 2018

How VPN can protect your privacy online

How VPN can protect your privacy online
In the world of today, security is the core issue. Users face various dangers when they surf the web, including hacking of personal and financial data. This problem forced the IT specialists to develop software that can protect personal details of the users online. The Virtual Private Network is a programme that enables the user to search and collect data from the Internet safely. If you would like to know more about VPNs read article about the advantages of this software.
15th May 2018


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham